Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Bhajantri, Lokesh B." wg kryterium: Autor


Wyświetlanie 1-5 z 5
Tytuł:
A Comprehensive Survey on Resource Management in Internet of Things
Autorzy:
Bhajantri, Lokesh B.
S., Gangadharaiah
Powiązania:
https://bibliotekanauki.pl/articles/1839312.pdf
Data publikacji:
2020
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
Internet of Things
resource allocation
resource discovery
resource management
Opis:
Efficient resource management is a challenging task in distributed systems, such as the Internet of Things, fog, edge, and cloud computing. In this work, we present a broad overview of the Internet of Things ecosystem and of the challenges related to managing its resources. We also investigate the need for efficient resource management and the guidelines given/suggested by Standard Development Organizations. Additionally, this paper contains a comprehensive survey of the individual phases of resource management processes, focusing on resource modeling, resource discovery, resource estimation, and resource allocation approaches based on performance parameters or metrics, as well as on architecture types. This paper presents also the architecture of a generic resource management enabler. Furthermore, we present open issues concerning resource management, pointing out the directions of future research related to the Internet of Things.
Źródło:
Journal of Telecommunications and Information Technology; 2020, 4; 27-43
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Survey on Data Perception in Cognitive Internet of Things
Autorzy:
Bhajantri, Lokesh B.
Baluragi, Prashant
Powiązania:
https://bibliotekanauki.pl/articles/309479.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
Internet of Things
Cognitive IT
data perception
cognitive agent
Opis:
A Cognitive Internet of Things (CIoT) is a brand of Internet of Things (IoT) with cognitive and agreeable mechanisms, which are incorporated to advance performance and accomplish insights into real world environments. CIoT can perceive present system’s conditions, analyze the apparent information, make smart choices, and increase the network performance. In this survey paper, we present classifications of data perception techniques used in CIoT. This paper also compares the data perception works against energy consumption, network life-time, resource allocation, and throughput, as well as quality of data and delay. In addition, simulation tools for IoT and their performance are discussed. Finally, we provide the model of cognitive agent-based data perception in CIoT for future research and development, which ensures the network performance in terms of reliability, energy efficient, accuracy, scalable, fault tolerant, and quality of data.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 3; 75-86
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure
Autorzy:
Mujawar, Tabassum N.
Bhajantri, Lokesh B.
Powiązania:
https://bibliotekanauki.pl/articles/2142312.pdf
Data publikacji:
2022
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cloud computing
CPABE
hierarchical access structure
Opis:
Cloud computing is being rapidly adopted by many organizations from different domains and large amounts of data is stored in the cloud. In order to ensure data security, the attribute-based access control mechanism has been emerging recently as a fine-grained access control model that grants access based on the data user’s attributes. In this model, the data owner builds the access policy using the attributes of the data users and access to the data is granted only if the requirements of such an access policy are satisfied. Ciphertext policy-based attribute-based encryption (CPABE) is one of the most widely used methods for providing encrypted access control. Complex, time consuming and costly paring operations are the major issue with the CPABE method. Hence, another efficient method is needed to reduce the data user’s overhead while decrypting data. This paper presents an efficient method consisting in outsourcing decryption operations to a third-party server, so that complex operations may be performed by that machine with only some simple calculations left on the data user’s side. The concept of a hierarchical access structure is also integrated with the traditional CPABE technique. The hierarchical approach enables the data owner to encrypt multiple data using a single common hierarchical access structure. This allows the user to decrypt only the relevant part of ciphertext, depending on which fragment of the hierarchical access structure is satisfied. The paper evaluates also the performance of the proposed model in terms of time and storage cost.
Źródło:
Journal of Telecommunications and Information Technology; 2022, 2; 75--81
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Convolutional Neural Network Model Based Human Wearable Smart Ring System : Agent Approach
Autorzy:
Bhajantri, Lokesh B.
Kagalkar, Ramesh M.
Ranjolekar, Pundalik
Powiązania:
https://bibliotekanauki.pl/articles/2055210.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
internet of things
agents
convolutional neural networks
smart ring system
agent knowledge base
Opis:
The Internet of Things has a set of smart objects with smart connectivity that assists in monitoring real world environment during emergency situations. It could monitor the various applications of emergency situations such as road accidents, criminal acts including physical assaults, kidnap cases, and other threats to people’s way of life. In this work, the proposed work is to afford real time services to users in emergency situations through Convolutional Neural Networks in terms of efficiency and reliable services. Finally, the proposed work has simulated with respect to the performance parameters of the proposed scheme like the probability of accuracy and processing time.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 4; 673--678
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hierarchical Access Structure-based Scheme with Outsourcing and Revocation Mechanism for Cloud Environment
Autorzy:
Mujawar, Tabassum N.
Adik, Ramrao
Bhajantri, Lokesh B.
Sutagundar, Ashok V.
Powiązania:
https://bibliotekanauki.pl/articles/27312940.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
attribute revocation
cloud computing
hierarchical access control
outsourced decryption
trust
Opis:
Ciphertext policy attribute-based encryption (CPABE) is one of the efficient implementations of encrypted access control scheme for cloud computing. Though multiple implementations of CPABE exist, there are some issues that need to be addressed, including efficient revocation approach, decryption time, storage cost etc. In this paper, an efficient scheme that incorporates a hierarchical access structure, outsourced decryption, as well as user and attribute revocation is presented. The hierarchical access structure is utilized to encrypt multiple data using one common access structure and makes the encryption process more efficient. The outsourcing server is used to perform partial decryption, so that all heavy computations are performed by this server and less overhead is incurred by the data user. The proposed framework also integrates the evaluation of trustworthiness of data users and service providers to ensure trusted and encrypted access control procedures. The paper also presents an analysis of the time required for performing different operations. Simulation results show that the proposed scheme outperforms the existing approaches.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 4; 83--92
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-5 z 5

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies