RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCIESCOPUS

        Secure and efficient protocol for fast handover in 5G mobile Xhaul networks

        Sharma, Vishal,You, Ilsun,Leu, Fang-Yie,Atiquzzaman, Mohammed Academic Press 2018 Journal of network and computer applications Vol.102 No.-

        <P><B>Abstract</B></P> <P>Mobile networks are observing an all time increase in the number of users and services. These networks have hit the 5G requisites in no time. Current service providers are aiming at resolving issues of subsisting networks by exploiting the capacity and coverage enhancement features of 5G. With a broad spectrum, it has now become more facile to accommodate an astronomically immense number of devices each having multiple applications authoritatively mandating network accessibility. Despite these advantages, such networks suffer from several issues cognate to smooth operations of fronthaul and backhaul, such as interference management, link-reliability, flatness, security and flexibility. Integrating fronthaul and backhaul together as a Xhaul is suggested as one of the efficient solutions for handling these issues. Xhaul forms integrated planes which use heterogeneous switches for high optical transmissions. Despite being efficient, Xhaul links are weak in terms of security. The situations will be more serious, particularly when a massive number of User Equipment (UE) and IoT devices are now connected to it. This issue is further raised when the terminal fortifying the fronthaul and backhaul moves leading to the formation of mobile Xhaul network. The current security solutions for WiFi, WiMax, WiBro, 4G/LTE are unable to fortify privacy and perfect forward secrecy in mobile Xhaul network, which is a quandary targeted in this paper. To resolve these issues, a novel key exchange and authentication protocol is proposed, which is capable of securing Xhaul links for a moving terminal in the network. The proposed approach is tested utilizing mobile ground node and drone as moving terminal across multiple hubs. The formal analysis utilizing BAN logic and AVISPA tool slake the security requisites and performance evaluation justifies the efficiency in comparison with the existing solutions.</P>

      • Adaptive selection of dynamic VM consolidation algorithm using neural network for cloud resource management

        Witanto, Joseph Nathanael,Lim, Hyotaek,Atiquzzaman, Mohammed Elsevier 2018 Future generation computer systems Vol.87 No.-

        <P><B>Abstract</B></P> <P>Cloud resource management becomes more important with the increasing usage of cloud resources. With various cloud options available, cloud provider may have different priority in managing the resource through resource scheduling and provisioning. Dynamic VM (Virtual Machine) consolidation algorithm is one of the techniques which can be used to reduce energy consumption through VM migration. Higher VM migration may lead to lower energy consumption and higher SLA violation. Although previous research has successfully decreased energy consumption and SLA violation, cloud providers may need to manage trade-offs between energy and SLA violation through availability of priority in the system. This paper proposes neural network-based adaptive selection of VM consolidation algorithms which adaptively chooses appropriate algorithm according to cloud provider’s goal priority and environment parameters. Dataset generation and performance evaluation using simulations on real-world PlanetLab VMs workload trace showed that adaptive selector produced better average performance score than independent methods on various evaluation priority.</P> <P><B>Highlights</B></P> <P> <UL> <LI> Studies on multiple dynamic VM consolidation algorithms on cloud environment. </LI> <LI> Discusses about trade-off between energy and SLA violation due to VM migration. </LI> <LI> Proposes adaptive system which chooses best algorithm based on provider’s priority. </LI> <LI> Evaluates performance of proposed system and individual VM migration algorithms. </LI> </UL> </P>

      • SCIESCOPUS

        Smart government framework with geo-crowdsourcing and social media analysis

        Witanto, Joseph Nathanael,Lim, Hyotaek,Atiquzzaman, Mohammed North-Holland 2018 Future generations computer systems Vol.89 No.-

        <P><B>Abstract</B></P> <P>Smart government utilizes data to improve services provided to the citizen. Smart city may benefit from citizen engagement through crowdsourcing and social media. This paper proposes a city event’s prediction with map-based visualization utilizing crowdsourced geodata collected from citizen’s report. Data is aggregated according to geo-position and used to predict next day’s event. Mindmap-based visualization utilizing social media processed with topic modeling and topic similarity calculation is also proposed in this work. Proof-of-concept application and proposed system’s processing time is evaluated to prove the feasibility of the system. Proposed system utilizes geo-crowdsourcing for event prediction visualization for government instead of direct services to citizen. Proposed social media visualization use topic modeling specifically created for short text which is appropriate for social media data.</P> <P><B>Highlights</B></P> <P> <UL> <LI> Proposes map-based reporting for government-related activities based on geo-crowdsourced data. </LI> <LI> Proposes mindmap-based reporting for social media analysis. </LI> <LI> Evaluates smart city frameworks, geo-crowdsourcing and social media analysis applications. </LI> </UL> </P>

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼