Capacity and Service (CapServ) Adaptive Trust Computation by Territory Formation in Ubiquitous Environment

Author(s):  
B. Adithya ◽  
B. Sathish Babu

Ubiquitous computing has been studied extensively as a post desktop model. Secure communication among various heterogeneous networks is been a challenge in service environment with location dynamism of the nodes. In this paper the authors proposed model for trust worthy communications among devices of various networks in a ubiquitous environment with varied service needs, security needs and computational-storage capacities. The model uses a novel approach for computing trust - adaptive to capacity and services.

2021 ◽  
Vol 25 (3) ◽  
pp. 711-738
Author(s):  
Phu Pham ◽  
Phuc Do

Link prediction on heterogeneous information network (HIN) is considered as a challenge problem due to the complexity and diversity in types of nodes and links. Currently, there are remained challenges of meta-path-based link prediction in HIN. Previous works of link prediction in HIN via network embedding approach are mainly focused on exploiting features of node rather than existing relations in forms of meta-paths between nodes. In fact, predicting the existence of new links between non-linked nodes is absolutely inconvincible. Moreover, recent HIN-based embedding models also lack of thorough evaluations on the topic similarity between text-based nodes along given meta-paths. To tackle these challenges, in this paper, we proposed a novel approach of topic-driven multiple meta-path-based HIN representation learning framework, namely W-MMP2Vec. Our model leverages the quality of node representations by combining multiple meta-paths as well as calculating the topic similarity weight for each meta-path during the processes of network embedding learning in content-based HINs. To validate our approach, we apply W-TMP2Vec model in solving several link prediction tasks in both content-based and non-content-based HINs (DBLP, IMDB and BlogCatalog). The experimental outputs demonstrate the effectiveness of proposed model which outperforms recent state-of-the-art HIN representation learning models.


2021 ◽  
pp. 1-11
Author(s):  
Aysu Melis Buyuk ◽  
Gul T. Temur

In line with the increase in consciousness on sustainability in today’s global world, great emphasis has been attached to food waste management. Food waste is a complex issue to manage due to uncertainties on quality, quantity, location, and time of wastes, and it involves different decisions at many stages from seed to post-consumption. These ambiguities re-quire that some decisions should be handled in a linguistic and ambiguous environment. That forces researchers to benefit from fuzzy sets mostly utilized to deal with subjectivity that causes uncertainty. In this study, as a novel approach, the spherical fuzzy analytic hierarchy process (SFAHP) was used to select the best food treatment option. In the model, four main criteria (infrastructural, governmental, economic, and environmental) and their thirteen sub-criteria are considered. A real case is conducted to show how the proposed model can be used to assess four food waste treatment options (composting, anaerobic digestion, landfilling, and incineration). Also, a sensitivity analysis is generated to check whether the evaluations on the main criteria can change the results or not. The proposed model aims to create a subsidiary tool for decision makers in relevant companies and institutions.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6546
Author(s):  
Kazi Masum Sadique ◽  
Rahim Rahmani ◽  
Paul Johannesson

The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.


Author(s):  
S. Rangriz ◽  
M. Davoodi ◽  
J. Saberian

Abstract. The enormous increase in the number of vehicles in the cities makes plenty of problems including air pollution, noise pollution, and traffic jam. Overcoming these annoying issues needs a significant plan in urban management such as using modern techniques in public transportation systems. Sharing either cars or taxies is one of the most interesting ways that has been used in some countries recently. In this phenomenon, 2 or 3 people use other’s car or taxi. In this article, an innovative approach to share taxies is proposed, and it uses a Genetic Algorithm to determine the placement of travelers in taxies. Therefore, some taxis will be switched off, and this helps to decrease urban traffic jam in cities. The results present that the proposed model turns off 69.8 % of taxies, and also 27.8 % of them carry more than one passenger; hence, this confirms the performance of the proposed model.


2020 ◽  
Vol 8 (6) ◽  
pp. 5820-5825

Human computer interaction is a fast growing area of research where in the physiological signals are used to identify human emotion states. Identifying emotion states can be done using various approaches. One such approach which gained interest of research is through physiological signals using EEG. In the present work, a novel approach is proposed to elicit emotion states using 3-D Video-audio stimuli. Around 66 subjects were involved during data acquisition using 32 channel Enobio device. FIR filter is used to preprocess the acquired raw EEG signals. The desired frequency bands like alpha, delta, beta and theta are extracted using 8-level DWT. The statistical features, Hurst exponential, entropy, power, energy, differential entropy of each bands are computed. Artificial Neural network is implemented using Sequential Keras model and applied on the extracted features to classify in to four classes (HVLA, HVHA, LVHA and LVLA) and eight discrete emotion states like clam, relax, happy, joy, sad, fear, tensed and bored. The performance of ANN classifier found to perform better for 4- classes than 8-classes with a classification rate of 90.835% and 74.0446% respectively. The proposed model achieved better performance rate in detecting discrete emotion states. This model can be used to build applications on health like stress / depression detection and on entertainment to build emotional DJ.


2012 ◽  
Vol 182-183 ◽  
pp. 860-864
Author(s):  
Mi Cheng Lu ◽  
Ta Wei Tai ◽  
Li Hsiang Chiu

The environment of the network is by Electronic, Mobile gets to Ubiquitous, has already been irreversible trend, and the implementation of RFID technology had aroused discussion in a lot of fields. We think that the combination of RFID and Ubiquitous environment will cause another commercial revolution. Many industries had deployed RFID, like aviation industry, in which RFID is used in maintenance materials and baggage management. This paper discusses the implementation of RFID in Maintenance, Repair and Overhaul (MRO) process and the building of a ubiquitous computing environment. We believe that our proposal has three merits to MRO (1) anti-counterfeit parts (2) MRO liability (3) efficient and effective inspection. The architecture can address the competition pressure that aviation industry faces and consequently enhance competition advantages.


Author(s):  
Aabid Rashid ◽  
Diwankshi Sharma ◽  
Tufail A. Lone ◽  
Sumeet Gupta ◽  
Sachin Kumar Gupta

2009 ◽  
pp. 135-171
Author(s):  
Soe-Tsyr Yuan ◽  
Fang-Yu Chen

Peer-to-Peer applications harness sharing between free resources (storage, contents, services, human presence, etc.). Most existing wireless P2P applications concern merely the sharing of a variety of contents. For magnifying the sharing extent for wireless service provision in the vicinity (i.e., the wireless P2P environments), this chapter presents a novel approach (briefly named UbiSrvInt) that is an attempt to enable a pure P2P solution that is context aware and fault tolerant for ad-hoc wireless service provision. This approach empowers an autonomous peer to propel distributed problem solving (e.g., in the travel domain) through service sharing and execution in an intelligent P2P way. This approach of ad-hoc wireless service provision is not only highly robust to failure (based on a specific clustering analysis of failure correlation among peers) but also capable of inferring a user’s service needs (through a BDI reasoning mechanism utilizing the surrounding context) in ad-hoc wireless environments. The authors have implemented UbiSrvInt into a system platform with P-JXTA that shows good performance results on fault tolerance and context awareness.


Sign in / Sign up

Export Citation Format

Share Document