Agent-Based Cloud Computing Systems for Traffic Management

Author(s):  
Jan Vascak ◽  
Jakub Hvizdo ◽  
Michal Puheim
2015 ◽  
Vol 18 (2) ◽  
pp. 919-932 ◽  
Author(s):  
Mahmoud Al-Ayyoub ◽  
Yaser Jararweh ◽  
Mustafa Daraghmeh ◽  
Qutaibah Althebyan

Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1400
Author(s):  
Muhammad Adnan ◽  
Jawaid Iqbal ◽  
Abdul Waheed ◽  
Noor Ul Amin ◽  
Mahdi Zareei ◽  
...  

Modern vehicles are equipped with various sensors, onboard units, and devices such as Application Unit (AU) that support routing and communication. In VANETs, traffic management and Quality of Service (QoS) are the main research dimensions to be considered while designing VANETs architectures. To cope with the issues of QoS faced by the VANETs, we design an efficient SDN-based architecture where we focus on the QoS of VANETs. In this paper, QoS is achieved by a priority-based scheduling algorithm in which we prioritize traffic flow messages in the safety queue and non-safety queue. In the safety queue, the messages are prioritized based on deadline and size using the New Deadline and Size of data method (NDS) with constrained location and deadline. In contrast, the non-safety queue is prioritized based on First Come First Serve (FCFS) method. For the simulation of our proposed scheduling algorithm, we use a well-known cloud computing framework CloudSim toolkit. The simulation results of safety messages show better performance than non-safety messages in terms of execution time.


Open Physics ◽  
2019 ◽  
Vol 17 (1) ◽  
pp. 128-134 ◽  
Author(s):  
Wei Ma ◽  
Huanqin Li ◽  
Deden Witarsyah

Abstract Separation is the primary consideration in cloud computing security. A series of security and safety problems would arise if a separation mechanism is not deployed appropriately, thus affecting the confidence of cloud end-users. In this paper, together with characteristics of cloud computing, the separation issue in cloud computing has been analyzed from the perspective of information flow. The process of information flow in cloud computing systems is formalized to propose corresponding separation rules. These rules have been verified in this paper and it is shown that the rules conform to non-interference security, thus ensuring the security and practicability of the proposed rules.


2021 ◽  
Vol 39 ◽  
pp. 100366
Author(s):  
Leila Helali ◽  
Mohamed Nazih Omri

Sign in / Sign up

Export Citation Format

Share Document