Filters








2,688 Hits in 4.3 sec

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Guanwen Li, Huachun Zhou, Bohao Feng, Guanglei Li, Taixin Li, Qi Xu, Wei Quan
2017 Mobile Information Systems  
To address this problem, we propose a fuzzy security service chaining approach for MEC.  ...  Mobile-Edge Computing (MEC) is a novel and sustainable network architecture that enables energy conservation with cloud computing and network services offloading at the edge of mobile cellular networks  ...  To alleviate this problem, Mobile-Edge Computing (MEC) was proposed as a novel and sustainable mobile network framework [2] .  ... 
doi:10.1155/2017/8098394 fatcat:nps7v6sgcze53hwd2n2px3jsye

2019 Index IEEE Transactions on Cloud Computing Vol. 7

2020 IEEE Transactions on Cloud Computing  
-Dec. 2019 1039-1056 Android (operating system) Computing with Nearby Mobile Devices: A Work Sharing Algorithm for Mobile Edge-Clouds.  ...  -Dec. 2019 894-906 Game-Theory Based Power and Spectrum Virtualization for Optimizing Spectrum Efficiency in Mobile Cloud-Computing Wireless Networks. Zhang, X., +, TCC Oct.  ... 
doi:10.1109/tcc.2020.2969066 fatcat:uxhqc6ryenen7brk6qnejnciaa

Mobile E-Commerce Information System Based on Industry Cluster under Edge Computing

Jun Liu, Baixiang Pan, Xiaheng Zhang, Doudou Li, Sang-Bing Tsai
2021 Mobile Information Systems  
edge computing.  ...  In the context of edge computing, this paper takes mobile e-commerce information system as the research object and aims to study the mobile e-commerce information system based on industry clusters under  ...  E-Commerce Information System Based on Industry Cluster under Edge Computing Sample Selection and Data Collection.  ... 
doi:10.1155/2021/7930799 fatcat:cpfdxe4el5cr3irkpycn6rzv5y

Index [chapter]

2021 Cognitive Computing for Human-Robot Interaction  
342À343 green practices by few high-end hotels for promoting sustainability, 329t information technology and front of house, 344À347 key concept of sustainability in, 330À336 major certification for hotels  ...  C-Mean Clustering (FCM), 274 Fuzzy controllers, 210, 210f Fuzzy fractal dimension (FFD), 69À70 measures, 75À76 Fuzzy logic (FC), 337 H Haar Cascade Classifier technique, 293À294 Haar feature-based  ... 
doi:10.1016/b978-0-323-85769-7.00024-0 fatcat:elwoct6va5fxnn37abjdykp3ca

Complexity of the Analysis of Financial Cloud Based on Fuzzy Theory in the Wisdom of Sustainable Urban Development

Yi Chen, Dong Yao, Yinying Duan, Zhihan Lv
2021 Complexity  
This research mainly explores the application of financial cloud based on fuzzy theory in the sustainable development of smart cities.  ...  The security level model of cloud computing establishes an index system for evaluation objects based on the level of the security model and uses expert evaluation methods to build models for all levels  ...  He proposed a novel method for obtaining secure financial services based on multimedia big data in cloud computing using semantic-based access control (SBAC) technology. is model is designed to protect  ... 
doi:10.1155/2021/3444437 fatcat:dmnltojlx5hhvfynkc2nwvgzma

Big data reduction framework for value creation in sustainable enterprises

Muhammad Habib ur Rehman, Victor Chang, Aisha Batool, Teh Ying Wah
2016 International Journal of Information Management  
Value creation is a major sustainability factor for enterprises, in addition to profit maximization and revenue generation.  ...  However, cloud service utilization costs increase because of big data analytics and value creation activities for enterprises and customers.  ...  Mobile edge cloud computing architectures involve three layers of data processing whereby mobile devices near the data sources provide computational facilities for local data reduction (Akhbar, Chang,  ... 
doi:10.1016/j.ijinfomgt.2016.05.013 fatcat:4a44xeyb4rfkbf4pxbizijdjty

Trust and Reputation in the Internet of Things: State-of-the-art and Research Challenges

Giancarlo Fortino, Lidia Fotia, Fabrizio Messina, Domenico Rosaci, Giuseppe M.L. Sarne
2020 IEEE Access  
Also, we analyze the existing architectures for IoT and explain how to integrate IoT with fog/edge computing.  ...  INDEX TERMS Internet of Things, multi-agent system, reputation, trust, edge/fog computing.  ...  In particular, a formal semantics-based and the fuzzy set theory are exploited to implement the trust mechanism.  ... 
doi:10.1109/access.2020.2982318 fatcat:a3vx6d4q3rchlms2wnphliqofa

QUANTUM COMMUNICATION INTELLIGENCE CHAIN: A CARDINAL COADJUVANT MODEL

Prafulla Kumar Padhi
2019 Zenodo  
organizations (NGOs), academia, entrepreneurs, investors, and policymakers to assuage economic benefit setting the stage for exciting new devices and services in the years ahead.  ...  This conceptual research proposes a quantum communication intelligence chain (QCIC) cardinal symbiotic model composed of ―Integrant Technologies‖ that are unsung heroes integrating quantum computing, 5G  ...  Mobile edge computing is based on local analytics or the latency improvements promised by 5G interface, making possible the real-time and automated intelligence that can seamlessly propagate from the cloud  ... 
doi:10.5281/zenodo.2619266 fatcat:7v4mgxuxarfu7ccyx373ewrttu

IoT System Selection as a Fuzzy Multi-Criteria Problem

Galina Ilieva, Tania Yankova
2022 Sensors  
In order to find a feasible decision, this study develops a multi-criteria framework for IoT solution selection in a fuzzy environment.  ...  In the proposed framework, a new modification of the Multi-Attribute Border approximation Area Comparison (MABAC) method with a specific distance measure via intuitionistic fuzzy values has been presented  ...  The pandemic has revealed the need for sustainable and efficient agricultural value chains [9] .  ... 
doi:10.3390/s22114110 pmid:35684730 fatcat:6hclawt4zzbuthrhcaxs2ma7pu

Industry 5.0 is Coming: A Survey on Intelligent NextG Wireless Networks as Technological Enablers [article]

Shah Zeb, Aamir Mahmood, Sunder Ali Khowaja, Kapal Dev, Syed Ali Hassan, Nawab Muhammad Faseeh Qureshi, Mikael Gidlund, Paolo Bellavista
2022 arXiv   pre-print
architectures, potential enabling services, and others, essential for designing the objectives of CINGWNs to fulfill the Industry 5.0 vision requirements.  ...  of the technological enablers in the Industry 5.0 vision, which is the aim of this survey-based tutorial.  ...  on the mobile edge level.  ... 
arXiv:2205.09084v1 fatcat:uq6rfxhvp5acfc3jtem7dmdcwy

Risk assessment for sustainability on telecom supply chain: A hybrid fuzzy approach

Venkateswarlu Nalluri, Long-Sheng Chen
2022 Uncertain Supply Chain Management  
Telecom supply chain (TSC) research has determined several risk sources can happen for sustainable supply chain management (SSCM) due to their ambiguous nature.  ...  This is the first study using a hybrid fuzzy approach that analysed interrelationships of risk factors for SSCM.  ...  Step-2: A fuzzy direct relationship matrix (FDRM) was obtained from FFRM using a computer-based program.  ... 
doi:10.5267/j.uscm.2021.11.007 fatcat:c2rwkuuctnbw5irx2jrtbnfbja

State-of-the-Art Internet of Things in Protected Agriculture

Xiaojie Shi, Xingshuang An, Qingxue Zhao, Huimin Liu, Lianming Xia, Xia Sun, Yemin Guo
2019 Sensors  
agriculture is a mode of highly efficient development of modern agriculture that uses artificial techniques to change climatic factors such as temperature, to create environmental conditions suitable for  ...  In the edge computing, the downlink data of the edge represents the cloud service, the uplink data represents IoT service and the edge of edge computing refers to any computing and network resources between  ...  Chen et al. adopted fuzzy cognitive maps and fuzzy rule method to come up with an autonomous tracing system for backward design in food supply chain based on IoT, which better traced food product problems  ... 
doi:10.3390/s19081833 fatcat:u73hhei52rddjcnsblrj3k7xzm

Information and Communication Technology Solutions for the Circular Economy

Konstantinos Demestichas, Emmanouil Daskalakis
2020 Sustainability  
Cutting-edge technologies, such as big data, cloud computing, cyber-physical systems, internet of things, virtual and augmented reality, and blockchain, can play an integral role in the embracing of CE  ...  Results also suggest that greater emphasis is placed on the "reduce" component of the CE, although ICT solutions for the other "R" components, as well as holistic ICT-based solutions, do exist as well.  ...  Alvarado-Morales et al. analyze computer-based tools for the design and analysis of sustainable bioethanol production [95] .  ... 
doi:10.3390/su12187272 fatcat:x5ocur36gje4dmfdjdxlumflne

Features and Potential Security Challenges for IoT Enabled Devices in Smart City Environment

Gasim Alandjani
2018 International Journal of Advanced Computer Science and Applications  
Since Internet of Things is primarily responsible for carrying data of smart objects which are mostly connected over wireless technologies, securing of information carried by these wireless links to safeguard  ...  In this paper, we discuss various security issues that haunt the secure IoT deployments and propose a layered solution model that prevents breach of security during transmission of data.  ...  P2P, grid, cloud computing). Evaluation of trust management by fuzzy set theory and semantic based language on layered approach and layer attributes are history, risk and efficiency.  ... 
doi:10.14569/ijacsa.2018.090830 fatcat:k3g4dl22ojag5hhulhtkzjcjta

Table of Contents

2020 IEEE Transactions on Network Science and Engineering  
Pescap e 2608 Big Data on the Fly: UAV-Mounted Mobile Edge Computing for Disaster Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Li 2555 Secure Lending: Blockchain and Prospect Theory-Based Decentralized Credit Scoring Model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/tnse.2020.3028672 fatcat:g2rcdwq7zvde5bgpmys3ppvgli
« Previous Showing results 1 — 15 out of 2,688 results