• Title/Summary/Keyword: one-to-one computing

Search Result 2,208, Processing Time 0.024 seconds

An Efficient Multi-Layer Encryption Framework with Authentication for EHR in Mobile Crowd Computing

  • kumar, Rethina;Ganapathy, Gopinath;Kang, GeonUk
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.204-210
    • /
    • 2019
  • Mobile Crowd Computing is one of the most efficient and effective way to collect the Electronic health records and they are very intelligent in processing them. Mobile Crowd Computing can handle, analyze and process the huge volumes of Electronic Health Records (EHR) from the high-performance Cloud Environment. Electronic Health Records are very sensitive, so they need to be secured, authenticated and processed efficiently. However, security, privacy and authentication of Electronic health records(EHR) and Patient health records(PHR) in the Mobile Crowd Computing Environment have become a critical issue that restricts many healthcare services from using Crowd Computing services .Our proposed Efficient Multi-layer Encryption Framework(MLEF) applies a set of multiple security Algorithms to provide access control over integrity, confidentiality, privacy and authentication with cost efficient to the Electronic health records(HER)and Patient health records(PHR). Our system provides the efficient way to create an environment that is capable of capturing, storing, searching, sharing, analyzing and authenticating electronic healthcare records efficiently to provide right intervention to the right patient at the right time in the Mobile Crowd Computing Environment.

A Survey on Predicting Workloads and Optimising QoS in the Cloud Computing

  • Omar F. Aloufi;Karim Djemame;Faisal Saeed;Fahad Ghabban
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.59-66
    • /
    • 2024
  • This paper presents the concept and characteristics of cloud computing, and it addresses how cloud computing delivers quality of service (QoS) to the end-user. Next, it discusses how to schedule one's workload in the infrastructure using technologies that have recently emerged such as Machine Learning (ML). That is followed by an overview of how ML can be used for resource management. This paper then looks at the primary goal of this project, which is to outline the benefits of using ML to schedule upcoming demands to achieve QoS and conserve energy. In this survey, we reviewed the research related to ML methods for predicting workloads in cloud computing. It also provides information on the approaches to elasticity, while another section discusses the methods of prediction used in previous studies and those that used in this field. The paper concludes with a summary of the literature on predicting workloads and optimising QoS in the cloud computing.

A Modified Multiple Depth First Search Algorithm for Grid Mapping Using Mini-Robots Khepera

  • El-Ghoul, Sally;Hussein, Ashraf S.;Wahab, M. S. Abdel;Witkowski, U.;Ruckert, U.
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.4
    • /
    • pp.321-338
    • /
    • 2008
  • This paper presents a Modified Multiple Depth First Search algorithm for the exploration of the indoor environments occupied with obstacles in random distribution. The proposed algorithm was designed and implemented to employ one or a team of Khepera II mini robots for the exploration process. In case of multi-robots, the BlueCore2 External Bluetooth module was used to establish wireless networks with one master robot and one up to three slaves. Messages are sent and received via the module's Universal Asynchronous Receiver/Transmitter (UART) interface. Real exploration experiments were performed using locally developed teleworkbench with various autonomy features. In addition, computer simulation tool was also developed to simulate the exploration experiments with one master robot and one up to ten slaves. Computer simulations were in good agreement with the real experiments for the considered cases of one to one up to three networks. Results of the MMDFS for single robot exhibited 46% reduction in the needed number of steps for exploring environments with obstacles in comparison with other algorithms, namely the Ants algorithm and the original MDFS algorithm. This reduction reaches 71% whenever exploring open areas. Finally, results performed using multi-robots exhibited more reduction in the needed number of exploration steps.

Quantizing Personal Privacy in Ubiquitous Computing

  • Ma, Tinghuai;Tian, Wei;Guan, Donghai;Lee, Sung-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1653-1667
    • /
    • 2011
  • Privacy is one of the most important and difficult research issues in ubiquitous computing. It is qualitative rather than quantitative. Privacy preserving mainly relies on policy based rules of the system, and users cannot adjust their privacy disclosure rules dynamically based on their wishes. To make users understand and control their privacy measurement, we present a scheme to quantize the personal privacy. We aim to configure the person's privacy based on the numerical privacy level which can be dynamically adjusted. Instead of using the traditional simple rule engine, we implement this scheme in a complex way. In addition, we design the scenario to explain the implementation of our scheme. To the best of our knowledge, we are the first to assess personal privacy numerically to achieve precision privacy computing. The privacy measurement and disclosure model will be refined in the future work.

Adaptive Deadline-aware Scheme (ADAS) for Data Migration between Cloud and Fog Layers

  • Khalid, Adnan;Shahbaz, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1002-1015
    • /
    • 2018
  • The advent of Internet of Things (IoT) and the evident inadequacy of Cloud networks concerning management of numerous end nodes have brought about a shift of paradigm giving birth to Fog computing. Fog computing is an extension of Cloud computing that extends Cloud resources at the edge of the network, closer to the user. Cloud computing has become one of the essential needs of people over the Internet but with the emerging concept of IoT, traditional Clouds seem inadequate. IoT entails extremely low latency and for that, the Cloud servers that are distant and unknown to the user appear to be unsuitable. With the help of Fog computing, the Fog devices installed would be closer to the user that will provide an immediate storage for the frequently needed data. This paper discusses data migration between different storage types especially between Cloud devices and then presents a mechanism to migrate data between Cloud and Fog Layer. We call this mechanism Adaptive Deadline-Aware Scheme (ADAS) for Data migration between Cloud and Fog. We will demonstrate that we can access and process latency sensitive "hot" data through the proposed ADAS more efficiently than with a traditional Cloud setup.

A Mathematical Definition of Cognitive Science

  • Hyun, Woo-Sik
    • Proceedings of the Korean Society for Cognitive Science Conference
    • /
    • 2010.05a
    • /
    • pp.2-7
    • /
    • 2010
  • Formally, we may define cognitive science as the convergent study between symbolic and connectionist approaches at macro and micro levels. Since what we refer to as the human mind is regarded as a mathematical product of the human brain and the computing machine, we can obtain two mathematical dynamical projections: one from the set of human brains to the set of mind, the other from the set of computing machines to the set of mind. Then, we are having a new projection from the classical models to the quantum mind.

  • PDF

Modified GOMS-Model for Mobile Computing (모바일 작업을 위한 수정된 GOMS-model에 대한 연구)

  • Lee, Suk-Jae;Myung, Ro-Hae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.2
    • /
    • pp.85-93
    • /
    • 2009
  • GOMS model is a cognitive modeling method of human performance based on Goal, Operators, Methods, Selection rules. GOMS model was originally designed for desktop environment so that it is difficult for GOMS model to be implemented into the mobile environment. In addition, GOMS model would be inaccurate because the original GOMS model was based on serial processing, excluding one of most important human information processing characteristics, parallel processing. Therefore this study was designed to propose a modified GOMS model including mobile computing and parallel processing. In order to encompass mobile environment, an operator of 'look for' was divided into 'visual move to' and 'recognize' whereas 'point to' and 'click' were combined into 'tab.' The results showed that newly introduced operators were necessary to estimate more accurate mobile computing behaviors. In conclusion, modified-GOMS model could predict human performance more accurately than the original GOMS model in the mobile computing environment.

Soft computing-based slope stability assessment: A comparative study

  • Kaveh, A.;Hamze-Ziabari, S.M.;Bakhshpoori, T.
    • Geomechanics and Engineering
    • /
    • v.14 no.3
    • /
    • pp.257-269
    • /
    • 2018
  • Analysis of slope stability failures, as one of the complex natural hazards, is one of the important research issues in the field of civil engineering. Present paper adopts and investigates four soft computing-based techniques for this problem: Patient Rule-Induction Method (PRIM), M5' algorithm, Group Method of data Handling (GMDH) and Multivariate Adaptive Regression Splines (MARS). A comprehensive database consisting of 168 case histories is used to calibrate and test the developed models. Six predictive variables including slope height, slope angle, bulk density, cohesion, angle of internal friction, and pore water pressure ratio were considered to generate new models. The results of test studies are used for feasibility, effectiveness and practicality comparison of techniques with each other, and with the other available well-known methods in the literature. Results show that all methods not only are feasible but also result in better performance than previously developed soft computing based predictive models and tools. It is shown that M5' and PRIM algorithms are the most effective and practical prediction models.

Estimating Economic Service Life of Assets by Using National Wealth Statistic (국부 통계조사자료를 이용한 자산별 경제적 감가상각추정에 대한 연구)

  • Cho, Jin-Hyung;Oh, Hyun-Seung;Lee, Sae-Jae;Suh, Jung-Yul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.30 no.4
    • /
    • pp.170-181
    • /
    • 2007
  • The purpose of computing economic depreciation value is to find valuation of assets closely in line with market prices. The valuation of industrial assets are called Engineering Valuation. The two representative techniques for such valuation are Hulten-Wykoff Method, which estimates real value using regression equations, and T-factor Method devised at Iowa State University. The two are all empirical methods for computing service life (duration period). In this paper, we derived the service life by empirical methods using national wealth statistics, and also by more conventional methods such as original group method and retirement method. The results from each method are compared with one another. We also computed economic service life from these results. In S. Korea where amount of asset value statistics is still insufficient, the most effective method for empirically computing economic service life turns out to be the one using national wealth statistics. In addition, we also present economic relationship between depreciation value computed by using Hulten-Wykoff Method and depreciation value computed by using T-factor Method.

Design and Implementation of Parallel MPEG Encoder with MPI on Cluster System (클러스터환경에서 MPI를 이용한 병렬 MPEG인코더의 설계 및 구현)

  • Lee, Joa-Hyoung;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1744-1750
    • /
    • 2008
  • As the computing and network technique move rm and spread widly, the usage of multimedia application becomes in general while the usage of text based application becomes low. Especially the application which treats the streaming media such as video or movie, one of multimedia data, holds a majority in the usage of computing. MPEG, one of the typical compression standard of streaming media, provides very high compression ratio so that general users could be close to the streaming media with easy usage. However, the encoding of MPEG requires lots of computing power and time. In the paper, we design and implement a parallel MPEG encoder with MPI in cluster envrionment to reduce the encoding time of MPEG.