It is essential to detect inconsistencies or failures early. In manufacturing and logistic processes, items are tracked continuously to detect loss or to reroute them during transport. To answer this need complex event processing (CEP) systems have evolved as a key paradigm for business and industrial applications. CEP systems allow to detect situations by performing […]
SOCIAL NETWORK ANALYSIS-BASED MOBILE NODE GROUPING
The proposed cooperative packet delivery approach is related to the concept of delay-tolerant networks (DTNs), in this section, we review the related work on delay tolerant and cooperative data transmission in wireless networks. DTNs are characterized by long transmission delay, high error rates, intermittent connectivity, and existence of multiple unreliable links . Vehicular delay tolerant […]
Pricing model for cloud computing in waiting time distribution
Power dissipation and circuit delay in digital CMOS circuits can be accurately modeled by simple equations,even for complex microprocessor circuits. CMOS circuits have dynamic, static, and short-circuit power dissipation; however, the dominant component in a well-designed circuit is dynamic power consumption P. Cloud computing is quickly becoming an effective and efficient way of computing resources […]
Security Model in Data Storage Systems
Cloud Computing is related to identity based secure distributed data storage (IBSDDS) schemes. CLOUD computing provides users with a convenient mechanism to manage their personal files with the notion called database-as-a-service (DAS. In DAS schemes, a user can outsource his encrypted files to untrusted proxy servers. Proxy servers can perform some functions on the outsourced […]
Group key management (GKM) in mobile communication
The most important concerns is how to minimize the communication overhead when the shared GK is updated among the subscribers. Treebased KM, one class of GKM, has received considerable attention from many researchers since the amount of overhead for group rekeying is proportional to the logarithm of the group size. Many researchers have proposed new […]
Analysis of a Naive Architecture of Mobile Presence Service
Social network applications are becoming increasingly popular on mobile devices. A mobile presence service is an essential component of a social network application because it maintains each mobile user’s presence information, such as the current status (online/offline), GPS location and network address, and also updates the user’s online friends with the information continually. the system […]
Good rate of convergence with a guaranteed empirical risk minimization
The input data are not generated by an external source. The points at which the unknown function is observed need to be chosen by some specific algorithm. This last condition can be found in applications, among others, from neural networks, robotics, optimal control, and statistics. The case where kernel-based local models are employed for the […]