The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Burrows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic. 相似文献
Artificial Life and Robotics - Although the design of the reward function in reinforcement learning is important, it is difficult to design a system that can adapt to a variety of environments and... 相似文献
The edge computing model offers an ultimate platform to support scientific and real-time workflow-based applications over the edge of the network. However, scientific workflow scheduling and execution still facing challenges such as response time management and latency time. This leads to deal with the acquisition delay of servers, deployed at the edge of a network and reduces the overall completion time of workflow. Previous studies show that existing scheduling methods consider the static performance of the server and ignore the impact of resource acquisition delay when scheduling workflow tasks. Our proposed method presented a meta-heuristic algorithm to schedule the scientific workflow and minimize the overall completion time by properly managing the acquisition and transmission delays. We carry out extensive experiments and evaluations based on commercial clouds and various scientific workflow templates. The proposed method has approximately 7.7% better performance than the baseline algorithms, particularly in overall deadline constraint that gives a success rate.
Journal of Signal Processing Systems - Segmentation of thigh tissues (muscle, fat, inter-muscular adipose tissue (IMAT), bone, and bone marrow) from magnetic resonance imaging (MRI) scans is useful... 相似文献
The Journal of Supercomputing - Power consumption is likely to remain a significant concern for exascale performance in the foreseeable future. In addition, graphics processing units (GPUs) have... 相似文献
Neural Computing and Applications - In the present study, a novel application of backpropagated neurocomputing heuristics (BNCH) is presented for epidemic virus model that portrays the Stuxnet... 相似文献
Scalability is one of the most important quality attribute of software-intensive systems, because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload. In order to achieve scalability, thread pool system (TPS) (which is also known as executor service) has been used extensively as a middleware service in software-intensive systems. TPS optimization is a challenging problem that determines the optimal size of thread pool dynamically on runtime. In case of distributed-TPS (DTPS), another issue is the load balancing b/w available set of TPSs running at backend servers. Existing DTPSs are overloaded either due to an inappropriate TPS optimization strategy at backend servers or improper load balancing scheme that cannot quickly recover an overload. Consequently, the performance of software-intensive system is suffered. Thus, in this paper, we propose a new DTPS that follows the collaborative round robin load balancing that has the effect of a double-edge sword. On the one hand, it effectively performs the load balancing (in case of overload situation) among available TPSs by a fast overload recovery procedure that decelerates the load on the overloaded TPSs up to their capacities and shifts the remaining load towards other gracefully running TPSs. And on the other hand, its robust load deceleration technique which is applied to an overloaded TPS sets an appropriate upper bound of thread pool size, because the pool size in each TPS is kept equal to the request rate on it, hence dynamically optimizes TPS. We evaluated the results of the proposed system against state of the art DTPSs by a client-server based simulator and found that our system outperformed by sustaining smaller response times. 相似文献
The Journal of Supercomputing - The central cloud facilities based on virtual machines offer many benefits to reduce the scheduling costs and improve service availability and accessibility. The... 相似文献
The full potential linearized augmented plane wave method of density functional theory has been used to investigate the structural, electronic, magnetic and thermoelectric properties of cubic perovskites BaVO3 and LaVO3. The ferromagnetic ground state has been found to be stable by comparing the total energies of non-spin-polarized and spin-polarized calculations performed for optimized unit cells. For both compounds, the bond length and tolerance factor are also measured. From the band structures and density of states plots, it is found that both compounds are half-metallic. We found that the presence of V at the octahedral site of these perovskites develops exchange splitting through p-d hybridization, which results in a stable ferromagnetic state. The observed exchange splitting is further clarified from the magnetic moment, charge and spin of the anion and cations. Finally, we also presented the calculated thermoelectric properties of these materials, which show that half-metallic BaVO3 and LaVO3 materials are potential contenders for thermoelectric applications. 相似文献
In this study, larvicidal activity of silver nanoparticles (AgNPs) synthesised using apple extract against fourth instar larvae of Aedes aegypti was determined. As a result, the AgNPs showed moderate larvicidal effects against Ae. aegypti larvae (LC50 = 15.76 ppm and LC90 = 27.7 ppm). In addition, comparison of larvicidal activity performance of AgNPs at high concentration prepared using two different methods showed that Ae. aegypti larvae was fully eliminated within the duration of 2.5 h. From X‐ray diffraction, the AgNP crystallites were found to exhibit face centred cubic structure. The average size of these AgNPs as estimated by particle size distribution was in the range of 50–120 nm. The absorption maxima of the synthesised Ag showed characteristic Ag surface plasmon resonance peak. This green synthesis provides an economic, eco‐friendly and clean synthesis route to Ag.Inspec keywords: silver, nanofabrication, X‐ray diffraction, zoology, particle size, nanoparticles, biomedical materials, nanomedicineOther keywords: time 2.5 h, size 50 nm to 120 nm, silver nanoparticle, larvicidal property, instar larvae, Aedes aegypti, larvicidal effect, larvicidal activity performance, X‐ray diffraction, nanoparticle particle size distribution, absorption maxima, silver surface plasmon resonance peak相似文献