SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:1084 8045 OR L773:1095 8592 "

Sökning: L773:1084 8045 OR L773:1095 8592

  • Resultat 1-10 av 27
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Abbas, Muhammad Tahir, et al. (författare)
  • Towards zero-energy : Navigating the future with 6G in Cellular Internet of Things
  • 2024
  • Ingår i: Journal of Network and Computer Applications. - : Elsevier. - 1084-8045 .- 1095-8592. ; 230
  • Tidskriftsartikel (refereegranskat)abstract
    • The Cellular Internet of Things (CIoT) has seen significant growth in recent years. With the deployment of 5G, it has become essential to reduce the power consumption of these devices for long-term sustainability. The upcoming 6G cellular network introduces the concept of zero-energy CIoT devices, which do not require batteries or manual charging. This paper focuses on these devices, providing insight into their feasibility and practical implementation. The paper examines how CIoT devices use simultaneous wireless information and power transfer, beamforming, and backscatter communication techniques. It also analyzes the potential use of energy harvesting and power management in zero-energy CIoT devices. Furthermore, the paper explores how low-power transceivers can lower energy usage while maintaining dependable communication functions.
  •  
2.
  • Atif, Yacine, et al. (författare)
  • Network Resource Management in Support of QoS in Ubiquitous Learning
  • 2014
  • Ingår i: Journal of Network and Computer Applications. - Netherlands : Elsevier. - 1084-8045 .- 1095-8592. ; 41, s. 148-156
  • Tidskriftsartikel (refereegranskat)abstract
    • Ubiquitous learning involves a large-scale service network organized as a social infrastructure. These environments weave together context service dissemination, learner profiling as well as autonomic control of the induced network traffic. The objective of the research presented in this paper is to derive a Quality of Service aware model of ubiquitous learning services based on typical learning schemes. These pedagogical patterns are designed to match various learning situations in terms of learning context, learner profile and network infrastructure. They particularly represent classes of services in ubiquitous learning environments to prioritize traffic so that less important traffic does not consume network bandwidth and slow down or halt the delivery of more important traffic. We analyze formally and empirically the network traffic requirements of a proposed learning service quality controller to support providers of learning services allocating resources in a pervasive learning environment.
  •  
3.
  • Baqer Mollah, Muhammad, et al. (författare)
  • Security and privacy challenges in mobile cloud computing : Survey and way ahead
  • 2017
  • Ingår i: Journal of Network and Computer Applications. - : Elsevier. - 1084-8045 .- 1095-8592. ; 84, s. 38-54
  • Tidskriftsartikel (refereegranskat)abstract
    • The rapid growth of mobile computing is seriously challenged by the resource constrained mobile devices. However, the growth of mobile computing can be enhanced by integrating mobile computing into cloud computing, and hence a new paradigm of computing called mobile cloud computing emerges. In here, the data is stored in cloud infrastructure and the actual execution is shifted to cloud environment so that a mobile user is set free from resource constrained issue of existing mobile devices. Moreover, to avail the cloud services, the communications between mobile devices and clouds are held through wireless medium. Thus, some new classes of security and privacy challenges are introduced. The purpose of this survey is to present the main security and privacy challenges in this field which have grown much interest among the academia and research community. Although, there are many challenges, corresponding security solutions have been proposed and identified in literature by many researchers to counter the challenges. We also present these recent works in short. Furthermore, we compare these works based on different security and privacy requirements, and finally present open issues.
  •  
4.
  • Corredor, Iván, et al. (författare)
  • Knowledge-aware and service-oriented middleware for deploying pervasive services
  • 2012
  • Ingår i: Journal of Network and Computer Applications. - : Elsevier BV. - 1084-8045 .- 1095-8592. ; 35:2, s. 562-576
  • Tidskriftsartikel (refereegranskat)abstract
    • Many applications and services have emerged in the frame of new Internet of Things paradigm. This novel view has opened the Web services to a variety of devices especially to tiny and resource-constrained devices. Wireless Sensor and Actuator Networks belong to that kind of devices. Those networks have become one of the more promising technologies to take part in the Future Internet. However, the integration of Sensor and Actuator Networks into the Service Cloud is a hard challenge requiring specific new architectures and protocols. This paper presents a middleware approach addressing this important issue. A Knowledge-Aware and Service-Oriented Middleware (KASOM) for pervasive embedded networks is proposed. The major aim of KASOM is to offer advanced and enriched pervasive services to everyone connected to Internet. In this sense, KASOM implements mechanisms and protocols which allow managing the knowledge generated in pervasive embedded networks in order to expose it to Internet users in a readable way. General functional requirements of embedded sensor and actuator platforms have been taken into account when designing KASOM, with special attention in energy consumption, memory and bandwidth. The KASOM evaluation and validation will be demonstrated through a real Wireless Sensor and Actuator Network deployment based on integral healthcare services in a sanatorium.
  •  
5.
  • Jiang, Yuning, 1993-, et al. (författare)
  • A selective ensemble model for cognitive cybersecurity analysis
  • 2021
  • Ingår i: Journal of Network and Computer Applications. - : Elsevier. - 1084-8045 .- 1095-8592. ; 193
  • Tidskriftsartikel (refereegranskat)abstract
    • Dynamic data-driven vulnerability assessments face massive heterogeneous data contained in, and produced by SOCs (Security Operations Centres). Manual vulnerability assessment practices result in inaccurate data and induce complex analytical reasoning. Contemporary security repositories’ diversity, incompleteness and redundancy contribute to such security concerns. These issues are typical characteristics of public and manufacturer vulnerability reports, which exacerbate direct analysis to root out security deficiencies. Recent advances in machine learning techniques promise novel approaches to overcome these notorious diversity and incompleteness issues across massively increasing vulnerability reports corpora. Yet, these techniques themselves exhibit varying degrees of performance as a result of their diverse methods. We propose a cognitive cybersecurity approach that empowers human cognitive capital along two dimensions. We first resolve conflicting vulnerability reports and preprocess embedded security indicators into reliable data sets. Then, we use these data sets as a base for our proposed ensemble meta-classifier methods that fuse machine learning techniques to improve the predictive accuracy over individual machine learning algorithms. The application and implication of this methodology in the context of vulnerability analysis of computer systems are yet to unfold the full extent of its potential. The proposed cognitive security methodology in this paper is shown to improve performances when addressing the above-mentioned incompleteness and diversity issues across cybersecurity alert repositories. The experimental analysis conducted on actual cybersecurity data sources reveals interesting tradeoffs of our proposed selective ensemble methodology, to infer patterns of computer system vulnerabilities.
  •  
6.
  • Lin, Chao, et al. (författare)
  • BSeIn : A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
  • 2018
  • Ingår i: Journal of Network and Computer Applications. - : Elsevier. - 1084-8045 .- 1095-8592. ; 116, s. 42-52
  • Tidskriftsartikel (refereegranskat)abstract
    • To be prepared for the ‘Industry 4.0’-era, we propose a hierarchical framework comprising four tangible layers, which is designed to vertically integrate inter-organizational value networks, engineering value chain, manufacturing factories, etc. The conceptual framework allows us to efficiently implement a flexible and reconfigurable smart factory. However, we need to consider security inherent in existing (stand-alone) devices and networks as well as those that may arise in such integrations. Especially the existing solutions are insufficient to address these fundamental security concerns. Thus, we present a blockchain-based system for secure mutual authentication, BSeIn, to enforce fine-grained access control polices. The proposed system (with integrated attribute signature, multi-receivers encryption and message authentication code) is designed to provide privacy and security guarantees such as anonymous authentication, auditability, and confidentiality. BSeIn also scales well due to the utilization of smart contract. We then evaluate the security and performance of BSeIn. For example, findings from the performance evaluation demonstrate that Initialization/Request Issuance/Chain Transaction/State Delivery/Permission Update phase only cost 12.123/4.810/6.978/0.013/2.559s, respectively.
  •  
7.
  • Marotta, Antonio, et al. (författare)
  • A fast robust optimization-based heuristic for the deployment of green virtual network functions
  • 2017
  • Ingår i: Journal of Network and Computer Applications. - : Elsevier. - 1084-8045 .- 1095-8592. ; 95, s. 45-53
  • Tidskriftsartikel (refereegranskat)abstract
    • Network Function Virtualization (NFV) has attracted a lot of attention in the telecommunication field because it allows to virtualize core-business network functions on top of a NFV Infrastructure. Typically, virtual network functions (VNFs) can be represented as chains of Virtual Machines (VMs) or containers that exchange network traffic which are deployed inside datacenters on commodity hardware. In order to achieve cost efficiency, network operators aim at minimizing the power consumption of their NFV infrastructure. This can be achieved by using the minimum set of physical servers and networking equipment that are able to provide the quality of service required by the virtual functions in terms of computing, memory, disk and network related parameters. However, it is very difficult to predict precisely the resource demands required by the VNFs to execute their tasks. In this work, we apply the theory of robust optimization to deal with such parameter uncertainty. We model the problem of robust VNF placement and network embedding under resource demand uncertainty and network latency constraints using robust mixed integer optimization techniques. For online optimization, we develop fast solution heuristics. By using the virtualized Evolved Packet Core as use case, we perform a comprehensive evaluation in terms of performance, solution time and complexity and show that our heuristic can calculate robust solutions for large instances under one second.
  •  
8.
  • Modarres Razavi, Sara, et al. (författare)
  • On dynamic signaling congestion mitigation by overlapping tracking area lists
  • 2015
  • Ingår i: Journal of Network and Computer Applications. - : Elsevier. - 1084-8045 .- 1095-8592. ; 53, s. 164-172
  • Tidskriftsartikel (refereegranskat)abstract
    • Mitigating signaling congestion of tracing user equipments (UEs), adaptively to the changes in UE location and mobility patterns is a challenging issue in mobility management of Long Term Evolution (LTE) networks. Signaling congestion usually occurs due to many UEs behaving in a similar manner, e.g., massive and simultaneous UE mobility in a train movement scenario. LTE networks allow the use of tracking area lists (TALs), each being a list containing multiple tracking areas (TAs). The overlapping TAL scheme has been previously used for signaling congestion mitigation for snapshot scenarios. For maintaining the improved performance over non-list-oriented TA configuration over time, an automatic dynamic configuration framework, which is a key aspect in Self-Organizing Network (SON), has been applied in this paper. We develop a linear programming model for optimal TAL configuration. Repetitively solving the model for different time intervals gives an evaluation framework on the performance of SON location management. Comprehensive numerical results are presented in this study using a large-scale realistic network scenario. The experiments demonstrate the effectiveness of the SON dynamic framework in reducing the total signaling overhead of the network compared to the static TA. Moreover, the overlapping TAL scheme significantly improves the performance of the network in the tracking area update congested scenarios over the conventional TA configuration.
  •  
9.
  • Mohd, Bassam Jamil, et al. (författare)
  • A survey on lightweight block ciphers for low-resource devices : Comparative study and open issues
  • 2015
  • Ingår i: Journal of Network and Computer Applications. - : Elsevier BV. - 1084-8045 .- 1095-8592. ; 58, s. 73-93
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper investigates the lightweight block ciphers' implementations, which have received a fair amount of research for their essential security role in low-resource devices. Our objective is to present a comprehensive review of state-of-the-art research progress in lightweight block ciphers' implementation and highlight future research directions. At first, we present taxonomy of the cipher design space and accurately define the scope of lightweight ciphers for low-resource devices. Moreover, this paper discusses the performance metrics that are commonly reported in the literature when comparing cipher implementations. The sources of inaccuracies and deviations are carefully examined. In order to mitigate the confusion in the composite metrics, we developed a general metric which includes the basic metrics. Our analysis designated the energy/bit metric as the most appropriate metric for energy-constrained low-resource designs. Afterwards, the software and hardware implementations of the block cipher algorithms are surveyed, investigated, and compared. The paper selects the top performing ciphers in various metrics and suggests the Present cipher as a good reference for hardware implementations. What transpires from this survey is that unresolved research questions and issues are yet to be addressed by future research projects.
  •  
10.
  • Mohideen, Althaff C., et al. (författare)
  • Evaluating the impact of transport mechanisms on web performance for effective web access
  • 2019
  • Ingår i: Journal of Network and Computer Applications. - : Elsevier BV. - 1084-8045 .- 1095-8592. ; 137, s. 25-34
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper explores the design trade-offs required for an Internet transport protocol to effectively support web access. It identifies a set of distinct transport mechanisms and explores their use with a focus on multistreaming. The mechanisms are studied using a practical methodology that utilise the range of transport features provided by TCP and SCTP. The results demonstrate the relative benefit of key transport mechanisms and analyse how these impact web access performance. Our conclusions help identify the root causes of performance impairments and suggest appropriate choices guiding the design of a web transport protocol. Performing this analysis at the level of component transport mechanisms enables the results to be utilised in the design of new transport protocols, such as IETF QUIC.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 27
Typ av publikation
tidskriftsartikel (24)
forskningsöversikt (3)
Typ av innehåll
refereegranskat (25)
övrigt vetenskapligt/konstnärligt (2)
Författare/redaktör
Vasilakos, Athanasio ... (6)
Rajiullah, Mohammad, ... (2)
Gidlund, Mikael, 197 ... (2)
Mahmood, Aamir, 1980 ... (2)
Voigt, Thiemo (1)
Brunström, Anna, 196 ... (1)
visa fler...
Abbas, Muhammad Tahi ... (1)
Grinnemo, Karl-Johan ... (1)
Eklund, Johan, 1966- (1)
Alfredsson, Stefan, ... (1)
Ferré, G. (1)
Laurent, P. (1)
Hassan, Syed Ali (1)
Zeb, S. (1)
Hassan, S. A. (1)
Balador, Ali (1)
Akhunzada, Adnan (1)
Fischione, Carlo (1)
Mitrokotsa, Aikateri ... (1)
Kassler, Andreas, 19 ... (1)
Taheri, Javid (1)
Zomaya, Albert (1)
Atif, Yacine, 1967- (1)
Yuan, Di (1)
Johansson, Mats (1)
Zola, Enrica (1)
Bellavista, Paolo (1)
Tsiftes, Nicolas (1)
Delsing, Jerker (1)
Choo, Kim-Kwang Raym ... (1)
Buyya, Rajkumar (1)
Ferreira, Luis Lino (1)
Marotta, Antonio (1)
Gunnarsson, Fredrik (1)
Moe, Johan (1)
Yang, Ting (1)
Fowler, Scott (1)
Främling, Kary, 1965 ... (1)
Park, Pangun (1)
Jiang, Yuning, 1993- (1)
Atif, Yacine (1)
Zhang, Liren (1)
Ayani, Rassul (1)
Cai, Wentong (1)
Bazzi, Alessandro (1)
Baqer Mollah, Muhamm ... (1)
Kalam Azad, Md. Abul (1)
D’Andreagiovanni, Fa ... (1)
Mellouk, Abdelhamid (1)
Das, Ashok Kumar (1)
visa färre...
Lärosäte
Luleå tekniska universitet (7)
Karlstads universitet (4)
Linköpings universitet (3)
Kungliga Tekniska Högskolan (2)
Mälardalens universitet (2)
Mittuniversitetet (2)
visa fler...
Högskolan i Skövde (2)
RISE (2)
Umeå universitet (1)
Uppsala universitet (1)
Högskolan i Halmstad (1)
Chalmers tekniska högskola (1)
visa färre...
Språk
Engelska (27)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (17)
Teknik (7)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy