Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Computer Engineering

Digital Twin-Based Cooperative Control Techniques For Secure And Intelligent Operation Of Distributed Microgrids, Ahmed Aly Saad Ahmed Mar 2021

Digital Twin-Based Cooperative Control Techniques For Secure And Intelligent Operation Of Distributed Microgrids, Ahmed Aly Saad Ahmed

FIU Electronic Theses and Dissertations

Networked microgrids play a key role in constructing future active distribution networks for providing the power system with resiliency and reliability against catastrophic physical and cyber incidents. Motivated by the increasing penetration of renewable resources and energy storage systems in the distribution grids, utility companies are encouraged to unleash the capabilities of the distributed microgrid to work as virtual power plants that can support the power systems. The microgrids nature is transforming the grid and their control systems from centralized architecture into distributed architectures. The distributed networked microgrids introduced many benefits to the future smart grids, it created many challenges …


Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell Dec 2018

Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell

Conference papers

Energy-efficient, fair, stochastic leader-selection algorithms are designed for mobile sensing scenarios which adapt the sensing strategy depending on the mobile sensing topology. Methods for electing a cluster head are crucially important when optimizing the trade-off between the number of peer-to- peer interactions between mobiles and client-server interactions with a cloud-hosted application server. The battery-life of mobile devices is a crucial constraint facing application developers who are looking to use the convergence of mobile computing and cloud computing to perform environmental sensing. We exploit the mobile network topology, specifically the location of mobiles with respect to the gateway device, to stochastically …


Optimization And Management Techniques For Geo-Distributed Sdn-Enabled Cloud Datacenters' Provisioning, Khaled M. Alhazmi Aug 2018

Optimization And Management Techniques For Geo-Distributed Sdn-Enabled Cloud Datacenters' Provisioning, Khaled M. Alhazmi

Electronic Thesis and Dissertation Repository

Cloud computing has become a business reality that impacts technology users around the world. It has become a cornerstone for emerging technologies and an enabler of future Internet services as it provides on-demand IT services delivery via geographically distributed data centers. At the core of cloud computing, virtualization technology has played a crucial role by allowing resource sharing, which in turn allows cloud service providers to offer computing services without discrepancies in platform compatibility.

At the same time, a trend has emerged in which enterprises are adopting a software-based network infrastructure with paradigms, such as software-defined networking, gaining further attention …


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


Source Separation Approach To Video Quality Prediction In Computer Networks, Ruairí De Fréin May 2016

Source Separation Approach To Video Quality Prediction In Computer Networks, Ruairí De Fréin

Articles

Time-varying loads introduce errors in the estimated model parameters of service-level predictors in Computer Networks. A load-adjusted modification of a traditional unadjusted service-level predictor is contributed, based on Source Separation (SS). It mitigates these errors and improves service-quality predictions for Video-on-Demand (VoD) by :6 to 2dB.


Optimizing Virtual Machine I/O Performance In Cloud Environments, Tao Lu Jan 2016

Optimizing Virtual Machine I/O Performance In Cloud Environments, Tao Lu

Theses and Dissertations

Maintaining closeness between data sources and data consumers is crucial for workload I/O performance. In cloud environments, this kind of closeness can be violated by system administrative events and storage architecture barriers. VM migration events are frequent in cloud environments. VM migration changes VM runtime inter-connection or cache contexts, significantly degrading VM I/O performance. Virtualization is the backbone of cloud platforms. I/O virtualization adds additional hops to workload data access path, prolonging I/O latencies. I/O virtualization overheads cap the throughput of high-speed storage devices and imposes high CPU utilizations and energy consumptions to cloud infrastructures. To maintain the closeness between …


Computation Offloading Decisions For Reducing Completion Time, Salvador Melendez Jan 2015

Computation Offloading Decisions For Reducing Completion Time, Salvador Melendez

Open Access Theses & Dissertations

Mobile devices are being widely used in many applications such as image processing, computer vision (e.g. face detection and recognition), wearable computing, language translation, and battlefield operations. However, mobile devices are constrained in terms of their battery life, processor performance, storage capacity, and network bandwidth. To overcome these issues, there is an approach called Computation Offloading, also known as cyber-foraging and surrogate computing. Computation offloading consists of migrating computational jobs from a mobile device to more powerful remote computing resources. Upon completion of the job, the results are sent back to the mobile device. However, a decision must be made; …


Furthering The Growth Of Cloud Computing By Providing Privacy As A Service, David S. Allison, Miriam Am Capretz Jan 2011

Furthering The Growth Of Cloud Computing By Providing Privacy As A Service, David S. Allison, Miriam Am Capretz

Electrical and Computer Engineering Publications

The evolution of Cloud Computing as a viable business solution for providing hardware and software has created many security concerns. Among these security concerns, privacy is often overlooked. If Cloud Computing is to continue its growth, this privacy concern will need to be addressed. In this work we discuss the current growth of Cloud Computing and the impact the public sector and privacy can have in furthering this growth. To begin to provide privacy protection for Cloud Computing, we introduce privacy constraints that outline privacy preferences. We propose the expansion of Cloud Service Level Agreements (SLAs) to include these privacy …


Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi Jan 2011

Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi

Electrical & Computer Engineering and Computer Science Faculty Publications

In this paper we present the current results and analysis of the survey “Cloud forensics and critical criteria for cloud forensic capability” carried out towards digital forensic experts and practitioners. This survey was created in order to gain a better understanding on some of the key questions of the new field - cloud forensics - before further research and development. We aim to understand concepts such as its definition, the most challenging issues, most valuable research directions, and the critical criteria for cloud forensic capability.