SNA based resource optimization in optical network using fog and cloud computing

SK Sood, KD Singh - Optical Switching and Networking, 2019 - Elsevier
Optical transmission has emerged as the most cost-effective technology to implement high-
bandwidth based communications and to transmit the huge volume of data with low latency …

Reliable resource provisioning using bankers' deadlock avoidance algorithm in MEC for industrial IoT

EE Ugwuanyi, S Ghosh, M Iqbal, T Dagiuklas - IEEE Access, 2018 - ieeexplore.ieee.org
Multi-access edge computing (MEC) is a new 5G enabling technology proposed to reduce
latency by bringing cloud computing capability closer to IoT and mobile device users. MEC …

Time variant predictive control of autonomous vehicles

J Pumwa - International Journal of Innovative Technology and …, 2019 - journals.tultech.eu
This paper develops a linearized time variant model predictive control (MPC) approach for
controlling autonomous vehicle tracking on feasible trajectories generated from the vehicle …

An efficient distributed mutual exclusion algorithm for intersection traffic control

JB Lim, YS Jeong, DS Park, HM Lee - The Journal of Supercomputing, 2018 - Springer
As vehicular networking has recently been developed and commercialized, vehicular cloud
computing has received much attention in various research areas, such as intelligent …

SNA based QoS and reliability in fog and cloud framework

SK Sood - World Wide Web, 2018 - Springer
Fog and Cloud computing are ubiquitous computing paradigms based on the concepts of
utility and grid computing. Cloud service providers permit flexible and dynamic access to …

Detecting sybil attacks in cloud computing environments based on fail-stop signature

JB Lim, HC Yu, JM Gil - Symmetry, 2017 - mdpi.com
Due to the loosely coupled property of cloud computing environments, no node has
complete knowledge of the system. For this reason, detecting a Sybil attack in cloud …

Byzantine-resilient dual gossip membership management in clouds

JB Lim, KS Chung, HM Lee, K Yim, H Yu - Soft Computing, 2018 - Springer
In this paper, we present an effective and efficient Byzantine-resilient dual membership
management technique in cloud environments, in which nodes are prone to churn and the …

Avoid deadlock resource allocation (ADRA) model V VM-out-of-N PM

HHC Nguyen - International Journal of Innovative Technology …, 2019 - journals.tultech.eu
This paper presents an avoid deadlock resource allocation (ADRA) for model V VM-out-of-N
PM since cloud computing is a new computing paradigm composed of grid computing …

[HTML][HTML] Checking global usage of resources handled with local policies

C Bodei, VD Dinh, GL Ferrari - Science of Computer Programming, 2017 - Elsevier
We present a methodology to reason about resource usage (acquisition, release, revision,
and so on) and, in particular, to predict bad usage of resources. Keeping in mind the …

[PDF][PDF] Overview of Tunnel Boring Machines and Testing Devices for Drag Bits

D Katushin - International Journal of Innovative Technology and …, 2018 - academia.edu
The given article is written for the general overview of tunnel boring and testing devices for
drag bits. This is about the working principles of TBM, also it describes the materials, which …