In recent years, progressively data proprietors have embraced cloud storage service, by which they will subcontract their data to the cloud server to significantly reduce the local storage overhead, due to the rapid growth in the cloud computing market and development. Cloud computing is the delivery of hosting services that are provided to clients over the web. It is quite common, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that may be rapidly provisioned and released with minimal management effort or service provider interaction. Sensitive information on the cloud is developing unexpectedly and bringing up several challenges and massive security concerns of the modern-day world. The cloud data and services reside in massively scalable data centers and may be accessed ubiquitously. Some issues concern in accessing this data is the security and confidentiality of consumer data in phrases of its location, relocation, availability, and security. Numerous users are surfing the Cloud for various purposes, therefore, they have highly safe and protracted services. The long run of the cloud, especially in expanding the range of applications, involves away the deeper degree of privacy, and authentication. Because of the safety concern associated with cloud computing, this paper presents a Computer Security System for Cloud Computing by employing a simple data protection model where data is encrypted using Advanced Encryption Standard (AES) technique before it is launched to the cloud, thus ensuring data confidentiality and security which is implemented with packet tracer.
Researchers are yet to entirely mapped out the difficulty in allocating optimal resources to mobile Worldwide Interoperability for Microwave Access (WiMAX) subscribers. This research presents an optimal scheduling algorithm for WiMAX resource allocation based on an Particle Swarm Optimization (PSO). In this work, sub-group creation is used to offer a PSO-based technique for allocating subcarriers and Orthogonal Frequency Division Multiplexing (OFDM) symbols to mobile WiMAX customers. The WiMAX network environment is organized into seven layers, with seven different modulation and coding algorithms proposed for sending packets to subscribers within each layer. By adopting an improved PSO-based WiMAX resource allocation method, an enhanced model for throughput maximization and channel data rate was implemented. The Aggregate Data Rate (ADR) and Channel Data Rate (CDR) for each scenario were obtained by simulating several scenarios of WiMAX multicast service to mobile users. Based on the performance evaluation of the enhanced algorithm for ADR and CDR, the results for the various layers and uniform distribution of users over the full layers were 350Mbps, 525Mbps, 700Mbps, 1050Mbps, 1050Mbps, 1400Mbps, 1575Mbps, and 1398Mbps. 6.98Mbps, 10.48Mbps, 13.97Mbps, 20.95Mbps, 20.95Mbps, 27.94Mbps, 31.5Mbps, and 28Mbps were also achieved for CDR. The significance of optimal resource allocation is to achieved a maximum ADR and CDR. The results showed a fair distribution of resources within the coverage area of the network.
In the world of aviation, current evidence suggests that data management systems are majorly centralized and at the same time suffer some noted shortfalls. Whereas, under this system of operation, it is hard to guarantee trust, especially data provenance, in addition to other shortfalls. More so, there are issues of lack of sufficient governance of data immutability, transparency, auditability, and traceability; which present debilitating drawbacks to the current regime of centralized data management systems in aviation industries. Blockchain as a new normal disruptive technology promises potency and reliability in data trust, traceability, transparency, auditability, and immutability. Blockchain further emphasizes immutability for stored and exchanged data, in transaction environments, in a decentralized and secure manner. That is, in a manner whereby a trusted third-party involvement is not required. For this reason, this paper discusses and highlights the key characteristics that differentiate and denominate Blockchain. It dwells more upon Blockchain application in aviation, in its several sectors such as passenger verification, In-flight Entertainment (IFE) Monetization, Smart Contract, Digital Identity, Distribution, Payment, and so on. Also, the paper did not conclude without pointing out areas of inconclusive research in Blockchain technology to stimulate further research studies leading to new understanding, knowledge, ideation, and idea incubation.
Unmanned Aerial Systems (UAS) are considered as evolving technology due to the diversity and feasibility of their applications. Generally, UAS are controlled by a ground operator in a ground control station (GCS). GCS can be used for several remote applications for unmanned vehicles; however, for the purpose of this review, GCS applications would be limited to its application on Unmanned Aerial Vehicles (UAV). Such stations are made up of basic components consisting of commercial-off-the-shelf components and low-cost equipment depending on the sophistication of the UAV. This requires that as UAVs evolve, GCS are equally upgraded to meet with the technological feet. This paper discusses the challenges associated with GCS in ensuring safe operations of the UAV. Hence, a brief background of GCS, its architecture, applications, inherent challenges and the proposed solutions are presented.
Network-on-Chip (NoC) has been proposed as a viable solution to the communication challenges on System-on-Chips (SoCs). As the communication paradigm of SoC, NoCs performance depends mainly on the type of routing algorithm chosen. In this paper different categories of routing algorithms were compared. These include XY routing, OE turn model adaptive routing, DyAD routing and Age-Aware adaptive routing. By varying the load at different Packet Injection Rate (PIR) under random traffic pattern, comparison was conducted using a 4 × 4 mesh topology. The Noxim simulator, a cycle accurate systemC based simulator was employed. The packets were modeled as a Poisson distribution; first-in-first-out (FIFO) input buffer channel with a depth of five (5) flits and a flit size of 32 bits; and a packet size of 3 flits respectively. The simulation time was 10,000 cycles. The findings showed that the XY routing algorithm performed better when the PIR is low. In a similar vein, the DyAD routing and Age-aware algorithms performed better when the load i.e. PIR is high.
Call Setup Time (CST) is one of the key performance indicators (KPIs) that Mobile Network Providers (MNPs) are mostly appertain. It has been established that long CST usually severely affects the user experience. Owing to the limitations associated with gleaning the CST data from MNPs, this paper provides the development of QoS estimation algorithm from various CST parameters. The algorithm involves the determination of CST; Inter-Burst time; Intra-Burst time and Call duration in time domain. The caller Frequency content was also determined by the application of fast Fourier Transform before computing the Mean Square Error (MSE). The eventual QoS rating is done after the computation of the MSE from various individual parameters. Four hourly data consisting of 10 sets each were collected three times in a week for four weeks for each MNP’s for creating Caller Ringtone dataset and testing the developed algorithm. Performance analysis of the system in accurately determining: CST; Intraburst time; Interburst time and Call durations were carried out. Results obtained shows that the proposed technique accurately computes these parameters and maximum error obtained was to the value of 10%. Furthermore, the QoS obtained shows an error margin of less than 5 % was observed when the developed technique was compared to the ground truth. Thus, the proposed algorithm was able to compute the QoS using Caller Ringtone only, thus independent of MNP.
Color image enhancement is one of important process and actually a vital precursory stage to other stages in the field of digital image processing. This is due to the fact that the effectiveness of processes in this stage on the output determines the success of other stages for a quality overall performance. This paper presents a color image enhancement technique using lifting wavelet transform (LWT) and contrast limited adaptive histogram equalization (CLAHE) to overcome the issue of noise amplification, over and under-enhancement in exiting enhancement techniques. Test images from Computer Vision Database were used for the proposed technique and the performance was evaluated using PSNR and SSIM. Result obtained shows an average improvement of 56.4% and 20.98% in terms of PSNR and SSIM respectively.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.