Participatory sensing has the problem that contributions are sporadic and infrequent. To overcome this, we formulate a market-based framework for participatory sensing with plausible models of the market participants comprising data contributors, service consumers and a service provider. We analyze the market equilibrium and obtain a closed form expression for the resulting QCS at market […]
K-Out-Of-N Computing Approach For Data Storage And Processing In Mobile Cloud
In this abstract, we propose the first framework to support fault-tolerant and energy-efficient remote storage and processing under a dynamic network topology, i.e., mobile cloud. Our framework aims for applications that require energy-efficient and reliable distributed data storage and processing in dynamic network. We integrate the k-out-of-n reliability mechanism into distributed computing in mobile cloud […]
E-STAR – SECURE AND RELIABLE ROUTING PROTOCOLS FOR HETEROGENEOUS MULTIHOP WIRELESS NETWORKS
ESTAR integrates payment and trust systems with the routing protocol with the goal of enhancing route reliability and stability. We propose a multidimensional trust system based on processing the payment receipts. ESTAR stimulates the nodes not only to relay others’ packets even if they have many credits, but also to stabilize the routes and report […]
HOTEL ENERGY MANAGEMENT USING DEMAND BIDDING PROGRAM AND ITS APPLICATION
Demand bidding program (DBP) is one type of demand response. DBP attracts large energy consumers to participate and encourages them to reduce their energy use by setting their own target. The customer is free to choose a bidding value in terms of the amount of energy reduction. If the actual amount of energy saving conforms […]
BVCS: SHARING VISUAL SECRETS IN SINGLE IMAGE RANDOM DOT STEREOGRAMS
Visual cryptography (VC) is a technique that encrypts a secret image into n shares, with each participant holding one share; Conventional VCSs suffer from a transmission risk problem because the noise-like shares will raise the suspicion of attackers and the attackers might intercept the transmission. Previous research has involved in hiding shared content in halftone […]
COCKTAIL RECOMMENDATION APPROACH FOR TRAVEL PACKAGE
The rapid growth of online travel information imposes an increasing challenge for tourists who have to choose from a large number of available travel packages for satisfying their personalized needs. Moreover, to increase the profit, the travel companies have to understand the preferences from different tourists and serve more attractive packages. Therefore, the demand for […]
K-NEAREST NEIGHBOUR QUERY PROCESSING IN UNTRUSTED CLOUD ENVIRONMENTS
The emergence of mobile devices with fast Internet connectivity and geo-positioning capabilities has le d to a revolution in customized location – based services (LBS) , where users are enabled to access information about points of interest (POI ) that are relevant to their interests and are also close to their geographical coordinates. Pro b- […]
PRIVATE MATCHING PROTOCOLS BASED ON ASYMMETRIC SOCIAL PROXIMITY FOR ONLINE SOCIAL NETWORKS
In OSNs and Mobile Social Networks (MSNs), many distributed solutions to privately finding the social proximity between two users have been proposed in this abstract. The most common way of determining friendship between two people is through profile matching, i.e. finding out if they have common profile attributes, like interests, symptoms, or some other social […]
PERSONALIZED RECOMMENDER SYSTEM COMBINING USER INTEREST AND SOCIAL CIRCLE
In this abstract, three social factors, personal interest, inter-personal interest similarity, and interpersonal influence, fuse into a unified personalized recommendation model based on probabilistic matrix factorization. The personality is denoted by user-item relevance of user interest to the topic of item. To embody the effect of user’s personality, we mine the topic of item based […]