Purpose – Trust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing has emerged as a mitigation of several cloud computing limitations. However, selecting a trustworthy node from the fog network still presents serious challenges. This paper proposes an algorithm intended to mitigate the trust and the security issues related to selecting a node of a fog network. \nDesign/methodology/approach – The proposed model/algorithm is based on two main concepts: Machine learning using fuzzy neural networks and the Weighted Weakest Link algorithm. The crux of the proposed model is to be trained, validated and used to classify the fog nodes according to their trust scores. A total of 2482 certified computing products, in addition to a set of nodes composed of multiple items are used to train, validate, and test the proposed model. A scenario including nodes composed of multiple computing items is designed for applying and evaluating the performance of the proposed model/algorithm.\nFindings – The results show a well performing trust model with an accuracy of 0.9996. Thus, the end-users of fog computing services adopting the proposed approach could be more confident when selecting elected fog nodes. The trained, validated, and tested model was able to classify the nodes according to their trust level. The proposed model is a novel approach to fog nodes selection in a fog network.\nResearch limitations/implications – Certainly, all data could be collected, however, some features are very difficult to have their scores. Available techniques, such as regression analysis and the use of the experts have their own limitations. Experts might be subjective, even though the author used the fuzzy group decision making model to mitigate the subjectivity effect. A methodical evaluation by specialized bodies such as to the security certification process is paramount to mitigate these issues. The author recommend the repetition of the same study when data form such bodies is available.\nOriginality/value – The novel combination of Fuzzy Neural Network(FNN) and Weighted Weakest Link (WWL) in a trust model mitigates uncertainty, subjectivity, and enables trust classification of complex fog computing nodes. Furthermore, the combination also allowed the classification of fog nodes composed of diverse computing items, which is not possible without the WWL. The proposed algorithm will provide the required intelligence for end-users (devices) to make sound decisions when requesting fog services.
An article describes the development and practical application of control unit of the solar plant, located in Almaty city (Kazakhstan). Such system envisages using an electrical pump for circulation in the transfer medium, connecting a flat plate solar collector with a tank. There has been developed a controller for solar system management, able to control the solar thermal system’s current temperature. With the aim thereof in the proposed system the measurements are carried out from 6 digitizers (DS18B20 Dallas), using 16 wires. Using Dallas sensors and corresponding software it is possible to control the temperature level and heat amount. Usage of 4 digital sensors substantially increase the system control performance and raises data processing speed. There have been considered the possibilities of the sensors configuration for Arduino platforms, as well, the solar collector management scheme.
RFID is an automated identification technology which can be applied to many environments such as factory inventory, supply chain management, and access control, etc. we find that Chang authentication protocol can be easily broken by eavesdropping on the communication between the server and the tag. Therefore, we further propose a robust mutual authentication protocol which is feasible for the low cost RFID tags. Moreover, the proposed protocol can promise the security properties of user privacy, unlinkability and substantive privacy.
Fibers image analysis is a new approach used in textile industries based on image processing techniques to enhance fiber imaging applications. These applications include fibers defects detection, fabrics wrinkle measurement, and fabric surface roughness evaluation that employ image processing techniques. This paper presents a review of fibers and fabrics image analysis applications using image processing techniques. These analysis applications outlay digital image processing techniques and employ specific procedures for specific purposes. Some of these procedures are morphological and mathematical operations, and soft-computing techniques finitely used for the processing of the fibers and fabrics images. This reduces manual labor in locating or detecting the defects in the fibers as well as in the processed fabrics. The advantage of using imaging applications is in monitoring the fibers from its preparation, through the knitting for fabric formation to final packaging of the fabrics. It is evident from this review that there is more to achieve in fibers analysis using image processing. As far as the images are concerned, a standard database of fabrics and fibers images is the need of the current textile industries to test and evaluate new innovative methods and imaging applications.
This research uses iThink software of system dynamics as the research tool, and establishes a causal feedback diagram of a kindergarten operation. This research will set up the model of a dynamic operation. When some factors of the profit change fast, it can offer and change profits predict immediately. In this way, the operator find about method to improve management, then, avoid risks faced ahead of time. We design parameters and then come and analyze the way. Later kindergarten dynamic operation model was set up. The feasibility of this model was tested finally. The research will also provide suggestions according to the simulated and, also for policy planning and researches in the future.
This research aimed to propose a model of Strategic Knowledge Management (SKM) based on ICT tools according to the ores of Ned Herrmann. A non-experimental-transectional descriptive research was applied under the field modality, in which surveys were conducted by a population of 106 teachers and middle education managers at three educational institutions in Riohacha, Colombia; through an instrument that assumed the content of the variables under study, with 48 items and five alternative responses; this instrument was evaluated by ten (10) experts, just as its reliability was determined through the Cronbach Alpha Coefficient (SKM-0.80/TIC-0.81). They highlight the results that, in identifying the components of the SKM, the strategic component resulted in a high category, demonstrating the greatest aspect on which the efforts of institutional management are focused. In establishing the characteristics of the SKM, there are greater strengths in the aspects of supervision and leadership, considered to fall into a high category. By describing the learning styles that will be assumed in the application of ICT tools, greater focus was determined with the left cortical learning style. In terms of identifying the types of ICT tools, those intended to support communication processes were assessed in a moderate category. In characterizing the roles of actors in pedagogical practice, greater interest was determined on the part of those consulted to generate a commitment in the responsibility of students, the institution and teachers. In relation to forming the SKM model, proposals were structured aligned to each of the variables studied.
Barbell type concrete wall is a typical section of designing concept for reinforcement curtailments and seismic failure of required ranges of magnitudes. It is resolve meet architectural concepts and as well as configuration of high rise buildings. Concrete wall improper design reinforcement arrangements is sudden failure in earthquakes disasters. Most of the coding analysis evaluation based on analytical wise possible otherwise not applications systems. But these paper fully evaluate updated design and of correct reinforcements curtailment in barbell type concrete walls.