Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cloud Computing (2)
- IoT (2)
- Virtual Sensor (2)
- Autoencoders (1)
- Autonomic Management (1)
-
- Autonomic Smart City Management System (1)
- Cloud-Fog (1)
- Cloudlet (1)
- Collaborative Management (1)
- Compliance (1)
- Conflict management (1)
- Data Reduction (1)
- Deep Learning (1)
- Disarmament (1)
- Domain adaptation (1)
- Edge Computing (1)
- Edge nodes (1)
- Energy consumption (1)
- Fog Computing (1)
- Human Activity Recognition (1)
- Internet of Things (1)
- Internet of Things (IoT) (1)
- IoT Middleware Architecture (1)
- MITRE ATT&CK (1)
- Machine Learning as a Service (1)
- Machine learning as a service (1)
- Marketplace (1)
- Middleware (1)
- Mobile Cloud (1)
- Mobile Computing (1)
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Other Computer Sciences
Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System For Efficient, Sustainable, And Self-Adaptive Urban Environments, Elham Okhovat
Electronic Thesis and Dissertation Repository
This thesis proposes the concept of the Policy-based Autonomic Smart City Management System, an innovative framework designed to comprehensively manage diverse aspects of urban environments, ranging from environmental conditions such as temperature and air quality to the infrastructure which comprises multiple layers of infrastructure, from sensors and devices to advanced IoT platforms and applications. Efficient management requires continuous monitoring of devices and infrastructure, data analysis, and real-time resource assessment to ensure seamless city operations and improve residents' quality of life. Automating data monitoring is essential due to the vast array of hardware and data exchanges, and round-the-clock monitoring is critical. …
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Electronic Thesis and Dissertation Repository
In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …
Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger
Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger
Electrical and Computer Engineering Publications
This paper introduces the Virtual Sensor Middleware (VSM), which facilitates distributed sensor data processing on multiple fog nodes. VSM uses a Virtual Sensor as the core component of the middleware. The virtual sensor concept is redesigned to support functionality beyond sensor/device virtualization, such as deploying a set of virtual sensors to represent an IoT application and distributed sensor data processing across multiple fog nodes. Furthermore, the virtual sensor deals with the heterogeneous nature of IoT devices and the various communication protocols using different adapters to communicate with the IoT devices and the underlying protocol. VSM uses the publish-subscribe design pattern …
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Electronic Thesis and Dissertation Repository
Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …
Virtual Sensor Middleware: A Middleware For Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid
Virtual Sensor Middleware: A Middleware For Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid
Electronic Thesis and Dissertation Repository
Internet of Things is a massively growing field where billions of devices are connected to the Internet using different protocols and produce an enormous amount of data. The produced data is consumed and processed by different applications to make operations more efficient. Application development is challenging, especially when applications access sensor data since IoT devices use different communication protocols.
The existing IoT architectures address some of these challenges. This thesis proposes an IoT Middleware that provides applications with the abstraction required of IoT devices while distributing the processing of sensor data to provide a real-time or near real-time response and …
Agora: A Knowledge Marketplace For Machine Learning, Mauro Ribeiro
Agora: A Knowledge Marketplace For Machine Learning, Mauro Ribeiro
Electronic Thesis and Dissertation Repository
More and more data are becoming part of people's lives. With the popularization of technologies like sensors, and the Internet of Things, data gathering is becoming possible and accessible for users. With these data in hand, users should be able to extract insights from them, and they want results as soon as possible. Average users have little or no experience in data analytics and machine learning and are not great observers who can collect enough data to build their own machine learning models. With large quantities of similar data being generated around the world and many machine learning models being …
The Contributions Of Anatol Rapoport To Game Theory, Erika Simpson
The Contributions Of Anatol Rapoport To Game Theory, Erika Simpson
Political Science Publications
Game theory is used to rationally and dispassionately examine the strategic behaviour of nations, especially superpower behaviour. This article explains how basic game theory - at its simplest level - was used by Anatol Rapoport to generate ideas about how to enhance world peace. Rapoport was at the forefront of the game theoreticians who sought to conceptualize strategies that could promote international cooperation. Accordingly, the basic logic of game theory is explained using the game models of ‘Chicken’ and ‘Prisoner’s Dilemma’. These models were used by Rapoport in his books and lectures in simple and complex ways. Then Rapoport’s revolutionary …
Mlaas: Machine Learning As A Service, Mauro Ribeiro, Katarina Grolinger, Miriam Am Capretz
Mlaas: Machine Learning As A Service, Mauro Ribeiro, Katarina Grolinger, Miriam Am Capretz
Electrical and Computer Engineering Publications
The demand for knowledge extraction has been increasing. With the growing amount of data being generated by global data sources (e.g., social media and mobile apps) and the popularization of context-specific data (e.g., the Internet of Things), companies and researchers need to connect all these data and extract valuable information. Machine learning has been gaining much attention in data mining, leveraging the birth of new solutions. This paper proposes an architecture to create a flexible and scalable machine learning as a service. An open source solution was implemented and presented. As a case study, a forecast of electricity demand was …
Proxy-Based Mobile Computing Infrastructure, Azade Khalaj
Proxy-Based Mobile Computing Infrastructure, Azade Khalaj
Electronic Thesis and Dissertation Repository
In recent years, there has been a huge growth in mobile applications. More mobile users are able to access Internet services via their mobile devices e.g., smartphones ans tablets. Some of these applications are highly interactive and resource intensive. Mobile applications, with limited storage capacity, slow processors and limited battery life, could be connected to the remote servers in clouds for leveraging resources. For example, weather applications use a remote service that collects weather data and make this data available through a well-defined API. This represents a static partitioning of functionality between mobile devices and a remote server that is …
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Electronic Thesis and Dissertation Repository
With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …