2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)最新文献

筛选
英文 中文
A framework for cloud computing adoption by Saudi government overseas agencies 沙特政府海外机构采用云计算的框架
Ahmed Albugmi, R. Walters, G. Wills
{"title":"A framework for cloud computing adoption by Saudi government overseas agencies","authors":"Ahmed Albugmi, R. Walters, G. Wills","doi":"10.1109/FGCT.2016.7605063","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605063","url":null,"abstract":"This study aims to identify key factors that organizations should consider when deciding whether to adopt cloud computing, and sets out a framework for how these factors can be weighed in order to make a decision. The study uses the Saudi Government agencies as a case study and makes several specific recommendations that pertain to the Saudi authorities' implementation of cloud computing. Although there are many benefits associated with deployment of cloud computing applications, there are also several challenges, such as compliance, legal issues, hosting issues, security, trust and privacy. There are also inadequate resources and guidelines for the policy makers and managers to inform their decision of whether or not to adopt cloud computing. This study identifies a number of factors; technological, environmental, organizational and societal, which need to be considered when an organization decides whether or not to adopt cloud computing. After identifying these factors, the study develops a comprehensive framework for organizations to assess their readiness for cloud computing. In addition, the feasibility of cloud computing applications is assessed so that different delivery and deployment models can be taken into account, and cloud computing evaluated from both business and customer perspectives.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129056421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Empirical analysis of real time pricing mechanisms for demand side management: contemporary review 需求侧管理实时定价机制的实证分析:当代回顾
A. A. Mahmud, P. Sant, Faisal Tariq, D. Jazani
{"title":"Empirical analysis of real time pricing mechanisms for demand side management: contemporary review","authors":"A. A. Mahmud, P. Sant, Faisal Tariq, D. Jazani","doi":"10.1109/FGCT.2016.7605071","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605071","url":null,"abstract":"The smart grid promises a myriad of benefits for both the consumer and energy service providers. However, realising its potential is subject to solving a number of complex issues. One of the major directions of smart grid research is demand response modelling that aimed at reducing the peak demand and billing by introducing appropriate real time pricing. The main difficulty is in managing the optimum pricing on a real time basis. In this paper, we will provide a state of the art review of an existing approach that models demand response in real time and also the underlying model that is tested with real data by using a stochastic iterative process with simultaneous perturbation stochastic approximation algorithm. Our model shows that real time price is better than a flat rate price. We will provide a brief outlook to the future where we propose a model that takes complex customers' behaviour into consideration. The proposed model includes a real time Price Suggestion Unit (PSU) that assists users to further reduce their electricity price while reducing the aggregate load for the energy providers.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127192021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Wi-fi boost protocol in a heterogeneous network with Wi-Fi and RFID 具有Wi-fi和RFID的异构网络中的Wi-fi增强协议
Hyeong-Kyu Lee, Yunmin Kim, Tae-Jin Lee
{"title":"Wi-fi boost protocol in a heterogeneous network with Wi-Fi and RFID","authors":"Hyeong-Kyu Lee, Yunmin Kim, Tae-Jin Lee","doi":"10.1109/FGCT.2016.7605064","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605064","url":null,"abstract":"IEEE 802.11 Wireless Local Area Network (WLAN) supports multiple transmission rates according to the channel condition. In multi-rate IEEE 802.11 WLAN, the performance of stations with high rates may decline due to the relatively long channel occupation time of the stations with low rates. In order to mitigate this performance anomaly problem, we propose a new Medium Access Control (MAC) protocol. In the protocol, after the Access Point (AP) identifies the IDs of the near stations around the AP, it allocates time slots to the stations in the vicinity of the AP. Then they transmit data packets at the allocated time slots in a non-contention manner using the physical scheme of Wi-Fi. Through the simulation results, we show that the throughput of the proposed MAC protocol is superior to that of the traditional IEEE 802.11g by guaranteeing transmission opportunities of the stations near the AP.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120956095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data security in cloud computing 云计算中的数据安全
Ahmed Albugmi, M. Alassafi, R. Walters, G. Wills
{"title":"Data security in cloud computing","authors":"Ahmed Albugmi, M. Alassafi, R. Walters, G. Wills","doi":"10.1109/FGCT.2016.7605062","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605062","url":null,"abstract":"This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The paper will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Availability of data in the cloud is beneficial for many applications but it poses risks by exposing data to applications which might already have security loopholes in them. Similarly, use of virtualization for cloud computing might risk data when a guest OS is run over a hypervisor without knowing the reliability of the guest OS which might have a security loophole in it. The paper will also provide an insight on data security aspects for Data-in-Transit and Data-at-Rest. The study is based on all the levels of SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service).","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132534920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Encryption as a service for data healthcare cloud security 用于数据医疗保健云安全的加密服务
A. E. Bouchti, Samir Bahsani, Tarik Nahhal
{"title":"Encryption as a service for data healthcare cloud security","authors":"A. E. Bouchti, Samir Bahsani, Tarik Nahhal","doi":"10.1109/FGCT.2016.7605072","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605072","url":null,"abstract":"Data security continues to be one of the top concerns for cloud computing, an issue that's been intensified by recent high-profile attacks in healthcare. The encryption solution have to be quick and easy to provision and provides high levels of protec- tion without sacrificing network performance. It's another way to provide a critical layer of security to protect the customers. In this work, we are interested in data encryption in healthcare cloud. We propose a hybrid architecture based on Cryptography as a Service (CaaS) included the private cloud OpenStack platform. This architecture authorizes the cloud clients to be in control of their cryptographic operations and keys that they deploy in the cloud independently of the cloud provider. Firstly, we explore healthcare cloud environment and then we analyze some encryption algorithms. Secondly, we design and implement two cryptography algorithms (homomorphic encryption and RSA) in our proposed architecture for providing security to information based on OpenStack platform.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130981202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A simple power-saving transmission scheme for use in macrocell-small cell networks 一种用于宏蜂窝-小蜂窝网络的简单节能传输方案
Yao-Liang Chung
{"title":"A simple power-saving transmission scheme for use in macrocell-small cell networks","authors":"Yao-Liang Chung","doi":"10.1109/FGCT.2016.7605067","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605067","url":null,"abstract":"Among researchers seeking to enhance the network coverage of macrocells, the utilization of small cell base stations (SBSs) is regarded as an approach with considerable promise. In the present study, we present a straightforward yet robust power-saving transmission scheme for use in macrocellsmall cell networks. The scheme presented herein both allows an SBS to be activated or deactivated in an efficient manner in response to the traffic load and closes any coverage holes (i.e., areas where users are unable to get a signal from the wireless network) by smartly enlarging neighboring small cells as needed when users attempt to use the network. At the same time, the scheme also allows pre-determined data rate requirements to be maintained. Data from simulations utilizing the proposed scheme indicate that it provides far greater energy savings than the conventional scheme.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125291180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber security modeling for SCADA systems using stochastic game nets approach 基于随机博弈网的SCADA系统网络安全建模
A. E. Bouchti, Tarik Nahhal
{"title":"Cyber security modeling for SCADA systems using stochastic game nets approach","authors":"A. E. Bouchti, Tarik Nahhal","doi":"10.1109/FGCT.2016.7605070","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605070","url":null,"abstract":"The security of SCADA (Supervisory Control and Data Acquisition) and realtime systems represents a significant challenge in today's world. The research in cyber-attack activities have gained immense emphasis. One of such research efforts is modeling of cyber-attacks. In this context, several modeling approaches have been developed, such as approaches based on attack trees (AT). In this paper, we propose Colored Petri Net (SGN) modeling approach by extending the attack trees with new modeling constructs and analysis approaches. SGN based attack model is flexible enough to model Internet intrusion, including the static and dynamic features of the intrusion. The process and rules of building SGN based attack model from AT are also presented. In order to evaluate the risk of intrusion, some cost elements are added to SGN based attack modeling. We show how attack trees can be converted and analyzed in SGN. Finally, we provide a case study that illustrates the SGN approach.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122051701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using ABC and RRT algorithms to improve mobile robot path planning with danger degree 利用ABC和RRT算法改进移动机器人危险度路径规划
Y. Tusi, Hung-Yuan Chung
{"title":"Using ABC and RRT algorithms to improve mobile robot path planning with danger degree","authors":"Y. Tusi, Hung-Yuan Chung","doi":"10.1109/FGCT.2016.7605068","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605068","url":null,"abstract":"For mobile robots, being able to find a suitable route through an environment filled with varied obstacles, and to ensure that they can successfully reach their target point from the starting point in the most efficient manner is very important, and a necessary research topic. This article proposes a combination of Artificial Bee Colony Algorithm (ABC) and Rapidly-Exploring Random Tree (RRT) to produce a novel algorithm to meet these navigation requirements. This algorithm is then compared with the traditional ABC for path planning. Unlike previous algorithms, this study uses the RRT algorithm to find several extend points, choose the best extend point to move the bees. Because the Artificial Bee Colony algorithm is simply structured, easy to operate and quickly converges, it is able to address the problems of slow convergence and easy entrapment in local optimal solutions encountered in previous path planning algorithms. Although RRT has excellent characteristics in terms of the search area which is unknown, it is unstable for each planning. Thus, this thesis combines the characteristics of the artificial bee colony algorithm with the RRT algorithms, and considers the problem of robot path simulation with obstacles.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133605601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Direct optical communication on an optically reconfigurable gate array 光可重构门阵列上的直接光通信
Shinya Furukawa, I. S. A. Halim, Minoru Watanabe, F. Kobayashi
{"title":"Direct optical communication on an optically reconfigurable gate array","authors":"Shinya Furukawa, I. S. A. Halim, Minoru Watanabe, F. Kobayashi","doi":"10.1109/FGCT.2016.7605065","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605065","url":null,"abstract":"As one type of field programmable gate array (FPGA), optically reconfigurable gate arrays (ORGAs) have been undergoing continual development. ORGAs are optoelectronic devices consisting of a holographic memory, a laser array, a programmable gate array. Since the storage capacity of such holographic memory is greater than that of two-dimensional semiconductor memory, an ORGA can accommodate more huge gates and provide higher performance than FPGAs. A programmable gate array of an ORGA has numerous photodiodes that can be reconfigured optically using configuration contexts on a holographic memory. Although the photodiodes are normally used only for a configuration procedure, the photodiodes are useful for direct input of optical communication signals. This paper therefore presents a demonstration of optical communication on ORGA's programmable gate array.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperation and underlay mode selection in cognitive radio network 认知无线网络中的协作与底层模式选择
Ramy Amer, A. El-Sherif, Hanaa Ebrahim, A. Mokhtar
{"title":"Cooperation and underlay mode selection in cognitive radio network","authors":"Ramy Amer, A. El-Sherif, Hanaa Ebrahim, A. Mokhtar","doi":"10.1109/FGCT.2016.7605066","DOIUrl":"https://doi.org/10.1109/FGCT.2016.7605066","url":null,"abstract":"In this paper, we propose a technique for cooperation and underlay mode selection in cognitive radio networks. Hybrid spectrum sharing is assumed where the secondary user (SU) can access the primary user (PU) channel in two modes, underlay mode or cooperative mode with admission control. Overlay spectrum sharing allows the SU to occupy the spectrum only when the PU is idle. Cooperation (collaboration) occurs when the SU admits the PU's packet into a relay buffer to transmit in the subsequent timeslots, i.e. timeslots when no successful transmission from the PU source to the destination. In addition to accessing the channel in the overlay mode, secondary user is allowed to access the channel in the underlay mode by occupying the channel currently occupied by the primary user with small transmission power. It is proposed that the secondary user can exploit the underlay access only when the primary channel is at good transmission conditions or predicted to be in non-outage state. The destination sends a feedback message with the received SNR (channel quality status) to the PU source, which is overheard by the SU. The SU exploits the SNR feedback messages to build and update a belief function about the primary channel quality. The belief function leads the SU to select the best access mode each timeslot, underlay or cooperation. We characterize the maximum achievable throughput of our proposed hybrid spectrum sharing. By observing the simulation results, the proposed model attains noticeable improvement in the system performance in terms of maximum secondary user throughput than the conventional cooperation and noncooperation schemes.","PeriodicalId":378077,"journal":{"name":"2016 Fifth International Conference on Future Generation Communication Technologies (FGCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131079912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信