Search results for "2020"

showing 10 items of 4977 documents

Security and Privacy in Wireless IoT

2018

The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…

020203 distributed computingExploitEnd userbusiness.industryWireless networkComputer scienceNetwork security020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreComputer Science Applications0202 electrical engineering electronic engineering information engineeringWirelessEnergy supplyElectrical and Electronic EngineeringInternet of ThingsbusinessPrivate information retrievalcomputerIEEE Wireless Communications
researchProduct

Smart urbanism

2020

A characteristic of intelligent cities is urban development where local and national governments regulate land use plans in order to efficiently plan and control urban and real state growth.This article describes the case of use in urban licensing in the government of Colombia in which a digitalization system was designed and developed in the public administration where data collection, storage and analysis are carried out to control urban licensing in 37 cities of Colombia. The system allows visual and statistical analysis of the urban growth of the cities.The results obtained by the system have allowed to improve the control and legality of the construction licenses in Colombia and has co…

020203 distributed computingGovernmentData collectionLand useComputer scienceControl (management)02 engineering and technologyPlan (drawing)Principle of legalityUrban planning0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingUrbanismEnvironmental planningProceedings of the 10th Euro-American Conference on Telematics and Information Systems
researchProduct

Thorough analysis of Raspberry Pi devices in outdoor/indoor communications in terms of QoS

2020

The proliferation of commercial low-cost Small Board Computers (SBC) devices have allowed the deployment of many Wireless Sensor Networks (WSN) focused on different applications, mainly based on monitoring issues. These networks are characterized by a set of these SBCs devices working in a collaborative way where each device is sensing, processing and later sending out the data to the sink. These devices are equipped with power supply, a processing unit and communications capabilities (in particular WiFi), making themselves very interesting to fit in many topologies. However, their performance in terms of communications basically depends on the environment and usually heuristic techniques a…

020203 distributed computingHeuristic (computer science)Computer scienceQuality of serviceReal-time computing02 engineering and technologyNetwork topology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRay tracing (graphics)Wireless sensor networkThroughput (business)Multipath propagationJitterProceedings of the 10th Euro-American Conference on Telematics and Information Systems
researchProduct

A segmentation algorithm for noisy images

2005

International audience; This paper presents a segmentation algorithm for gray-level images and addresses issues related to its performance on noisy images. It formulates an image segmentation problem as a partition of a weighted image neighborhood hypergraph. To overcome the computational difficulty of directly solving this problem, a multilevel hypergraph partitioning has been used. To evaluate the algorithm, we have studied how noise affects the performance of the algorithm. The alpha-stable noise is considered and its effects on the algorithm are studied. Key words : graph, hypergraph, neighborhood hypergraph, multilevel hypergraph partitioning, image segmentation and noise removal.

020203 distributed computingHypergraphMathematics::Combinatorics[ INFO ] Computer Science [cs]Computer sciencebusiness.industrySegmentation-based object categorizationComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-space segmentationImage processing02 engineering and technologyImage segmentation[INFO] Computer Science [cs]020202 computer hardware & architectureComputer Science::Computer Vision and Pattern Recognition0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)SegmentationComputer vision[INFO]Computer Science [cs]Artificial intelligencebusinessAlgorithmMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining

2021

This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…

020203 distributed computingInformation privacyDistributed databasesDistributed databaseSettore ING-INF/03 - TelecomunicazioniComputer scienceReliability (computer networking)Secure Multi-Party Computation02 engineering and technologycomputer.software_genreSecret sharingData Mining; Data privacy; Distributed databases; Peer-to-peer computing; Secret sharing; Secure Multi-Party ComputationComputational Theory and MathematicsHardware and ArchitectureServerSignal Processing0202 electrical engineering electronic engineering information engineeringSecure multi-party computationData MiningData miningPeer-to-peer computingC-means data mining Privacy secret sharing secure multi-party computationSecret sharingcomputerData privacy
researchProduct

Image retrieval system for citizen services using penalized logistic regression models

2020

This paper describes a procedure to deal with large image collections obtained by smart city services based on interaction with citizens providing pictures. The semantic gap between the low-level image features and represented concepts and situations has been addressed using image retrieval techniques. A relevance feedback procedure is proposed for Content-Based Image Retrieval (CBIR) based on the modelling of user responses. One of the novelties of the proposal is that the feedback learning procedure can use the information that citizens themselves can provide when using these services.The proposed algorithm considers the probability of an image belonging to the set of those sought by the …

020203 distributed computingInformation retrievalComputer scienceRelevance feedback02 engineering and technologyLogistic regressionImage (mathematics)Set (abstract data type)Smart city0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingHigh dimensionalityImage retrievalSemantic gapProceedings of the 10th Euro-American Conference on Telematics and Information Systems
researchProduct

Combining congested-flow isolation and injection throttling in HPC interconnection networks

2011

Existing congestion control mechanisms in interconnects can be divided into two general approaches. One is to throttle traffic injection at the sources that contribute to congestion, and the other is to isolate the congested traffic in specially designated resources. These two approaches have different, but non-overlapping weaknesses. In this paper we present in detail a method that combines injection throttling and congested-flow isolation. Through simulation studies we first demonstrate the respective flaws of the injection throttling and of flow isolation. Thereafter we show that our combined method extracts the best of both approaches in the sense that it gives fast reaction to congesti…

020203 distributed computingInterconnectionbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSFlow (psychology)020206 networking & telecommunications02 engineering and technologyBandwidth throttlingThrottleNetwork congestion0202 electrical engineering electronic engineering information engineeringIsolation (database systems)businessCombined methodComputer network
researchProduct

Experimental trade-offs between different strategies for multihop communications evaluated over real deployments of wireless sensor network for envir…

2018

Although much work has been done since wireless sensor networks appeared, there is not a great deal of information available on real deployments that incorporate basic features associated with these networks, in particular multihop routing and long lifetimes features. In this article, an environmental monitoring application (Internet of Things oriented) is described, where temperature and relative humidity samples are taken by each mote at a rate of 2 samples/min and sent to a sink using multihop routing. Our goal is to analyse the different strategies to gather the information from the different motes in this context. The trade-offs between ‘sending always’ and ‘buffering locally’ approac…

020203 distributed computingInternetComputer Networks and Communicationsbusiness.industryComputer scienceTrade offsGeneral Engineering020206 networking & telecommunications02 engineering and technologyXarxes locals sense fil Wi-Filcsh:QA75.5-76.95Environmental monitoring0202 electrical engineering electronic engineering information engineeringlcsh:Electronic computers. Computer scienceInternet of ThingsbusinessWireless sensor networkComputer network
researchProduct

Energy Efficient Optimization for Computation Offloading in Fog Computing System

2017

In this paper, we investigate the energy efficient computation offloading scheme in a multi-user fog computing system. We consider the users need to make the decision on whether to offload the tasks to the fog node nearby, based on the energy consumption and delay constraint. In particular, we utilize queuing theory to bring a thorough study on the energy consumption and execution delay of the offloading process. Two queuing models are applied respectively to model the execution processes at the mobile device (MD) and fog node. Based on the theoretical analysis, an energy efficient optimization problem is formulated with the objective to minimize the energy consumption subjects to execution…

020203 distributed computingOptimization problemComputer sciencebusiness.industryNode (networking)Distributed computing020206 networking & telecommunicationsCloud computing02 engineering and technologyEnergy consumptionDistributed algorithm0202 electrical engineering electronic engineering information engineeringComputation offloadingbusinessMobile deviceEdge computingEfficient energy useGLOBECOM 2017 - 2017 IEEE Global Communications Conference
researchProduct

Migration process of the PEPPOL network from the AS2 to the AS4 protocol according to the European guidelines

2020

The PEPPOL network (PAN-European Public Procurement Online) is migrating from the AS2 to the AS4 protocol according to the guidelines established by the eDelivery platform of the CEF program (Connecting Europe Facility) of the European Commission. This article describes the bases of this migration process, the current status and the next necessary actions for the year 2020. The main objective is to present the analysis of results on the evolution and impact of the adoption of the AS4 protocol by the PEPPOL Access Points in all Europe until 2019.

020203 distributed computingProcess managementProcurementComputer scienceProcess (engineering)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingEuropean commission02 engineering and technologyProtocol (object-oriented programming)E-procurementProceedings of the 10th Euro-American Conference on Telematics and Information Systems
researchProduct