• Title/Summary/Keyword: decentralized data processing

Search Result 41, Processing Time 0.033 seconds

Mathematical modeling for flocking flight of autonomous multi-UAV system, including environmental factors

  • Kwon, Youngho;Hwang, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.595-609
    • /
    • 2020
  • In this study, we propose a decentralized mathematical model for predictive control of a system of multi-autonomous unmanned aerial vehicles (UAVs), also known as drones. Being decentralized and autonomous implies that all members make their own decisions and fly depending on the dynamic information received from other unmanned aircraft in the area. We consider a variety of realistic characteristics, including time delay and communication locality. For this flocking flight, we do not possess control for central data processing or control over each UAV, as each UAV runs its collision avoidance algorithm by itself. The main contribution of this work is a mathematical model for stable group flight even in adverse weather conditions (e.g., heavy wind, rain, etc.) by adding Gaussian noise. Two of our proposed variance control algorithms are presented in this work. One is based on a simple biological imitation from statistical physical modeling, which mimics animal group behavior; the other is an algorithm for cooperatively tracking an object, which aligns the velocities of neighboring agents corresponding to each other. We demonstrate the stability of the control algorithm and its applicability in autonomous multi-drone systems using numerical simulations.

Secure De-identification and Data Sovereignty Management of Decentralized SSI using Restructured ZKP (재구성된 영지식 증명을 활용한 탈중앙형 자기 주권 신원의 안전한 비식별화 및 데이터 주권 관리)

  • Cho, Kang-Woo;Jeon, Mi-Hyeon;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.205-217
    • /
    • 2021
  • Decentralized SSI(Self Sovereign Identity) has become an alternative to a new digital identity solution, but an efficient de-identification technique has not been proposed due to the unique algorithmic characteristics of data transactions. In this study, to ensure the decentralized operation of SSI, we propose a de-identification technique that does not remove identifiers by restructuring the verification results of ZKP (Zero Knowledge Proof) into a form that can be provided to the outside by the verifier. In addition, it is possible to provide restructured de-identification data without the consent of data subject by proposing the concept of differential sovereignty management for each entity participating in verification. As a result, the proposed model satisfies the domestic personal information protection law in a decnetralized SSI, in addition provides secure and efficient de-identification processing and sovereignty management.

Development Problems and Countermeasures of Rural E-Commerce Logistics in the Context of Big Data and Internet of Things

  • Xianfeng Zhu
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.267-274
    • /
    • 2023
  • As the Internet has expanded and the continuous expansion of online shopping in China, many rural areas also have sales outlets. Due to the impact of economic conditions, rural locations have inadequate e-commerce logistical infrastructure, the number of outlets is small, and each other is in a decentralized state. For various reasons, the advancement of rural e-commerce logistics lags far behind that in urban areas. As the Internet of Things with big data grow in popularity, we can create and enhance the assurance system for the booming ecommerce in rural areas by building the support system of rural online shopping platform, and strengthening the joint distribution of logistics terminals based on data mining, so as to encourage the quick and healthy growth of rural online shopping.

k-path diffusion method for Multi-vision Display Technique among Smart Devices (k-path 확산 방법을 이용한 스마트 디바이스 간 멀티비전 디스플레이 기술)

  • Ren, Hao;Kim, Paul;Kim, Sangwook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.1183-1186
    • /
    • 2014
  • Our research is different form traditional to have some large LED screen grouping together to constitute multi-vision technique. In this paper, we purpose a method of using k-path diffusion method to build connect between the devices and find an optimal data transmission path. In second half of this paper, through practical application, we using this technique transmitting data successfully and achieving a simple Multi-vision effect. This technique possess smart devices and Wifi P2P's features, these features improve system's dynamic and decentralized processing ability make our technique has high scalability.

NDynamic Framework for Secure VM Migration over Cloud Computing

  • Rathod, Suresh B.;Reddy, V. Krishna
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.476-490
    • /
    • 2017
  • In the centralized cloud controlled environment, the decision-making and monitoring play crucial role where in the host controller (HC) manages the resources across hosts in data center (DC). HC does virtual machine (VM) and physical hosts management. The VM management includes VM creation, monitoring, and migration. If HC down, the services hosted by various hosts in DC can't be accessed outside the DC. Decentralized VM management avoids centralized failure by considering one of the hosts from DC as HC that helps in maintaining DC in running state. Each host in DC has many VM's with the threshold limit beyond which it can't provide service. To maintain threshold, the host's in DC does VM migration across various hosts. The data in migration is in the form of plaintext, the intruder can analyze packet movement and can control hosts traffic. The incorporation of security mechanism on hosts in DC helps protecting data in migration. This paper discusses an approach for dynamic HC selection, VM selection and secure VM migration over cloud environment.

Implementation of a soap based web services for slip data process (전표데이터 처리를 위한 SOAP기반 웹서비스의 구현)

  • 황의철;정민영;정선태
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1435-1438
    • /
    • 2003
  • SOAP(Simple Object Access Protocol) that is a late protocol for exchange of information with Web Services that is useful for implementing common functions in especially a large size business area, is a protocol that is a lightweight, XML-based protocol over HTTP for exchange to information in decentralized, distributed environments. In this paper, we implement SOAP-based Web Services that can use with a slip database, for common slip processing functions in enterprise accounts in order to enhance the transparency of transactions by slip processing system. The result of this paper will contribute to increasing the productivity of enterprises through enhancing the standardization of slip data, reusability of functions, convenience of access, and efficiency of implementing applications.

  • PDF

Fault Tolerant Routing Algorithm Based On Dynamic Source Routing

  • Ummi, Masruroh Siti;Park, Yoon-Young;Um, Ik-Jung;Bae, Ji-Hye
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.223-224
    • /
    • 2009
  • A wireless ad hoc network is a decentralized wireless network. The network is ad hoc because each node is willing to forward data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. In this paper, we proposed new route maintenance algorithm to improve the efficiency and effective in order to reach destination node. In this algorithm we improve existing route maintenance in Dynamic Source Routing protocol, to improve the algorithm we make a new message we call Emergency Message (EMM). The emergency message used by the node moved to provide information of fault detection.

DRM-FL: A Decentralized and Randomized Mechanism for Privacy Protection in Cross-Silo Federated Learning Approach (DRM-FL: Cross-Silo Federated Learning 접근법의 프라이버시 보호를 위한 분산형 랜덤화 메커니즘)

  • Firdaus, Muhammad;Latt, Cho Nwe Zin;Aguilar, Mariz;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.264-267
    • /
    • 2022
  • Recently, federated learning (FL) has increased prominence as a viable approach for enhancing user privacy and data security by allowing collaborative multi-party model learning without exchanging sensitive data. Despite this, most present FL systems still depend on a centralized aggregator to generate a global model by gathering all submitted models from users, which could expose user privacy and the risk of various threats from malicious users. To solve these issues, we suggested a safe FL framework that employs differential privacy to counter membership inference attacks during the collaborative FL model training process and empowers blockchain to replace the centralized aggregator server.

A Study on Efficient Mixnet Techniques for Low Power High Throughput Internet of Things (저전력 고속 사물 인터넷을 위한 효율적인 믹스넷 기술에 대한 연구)

  • Jeon, Ga-Hye;Hwang, Hye-jeong;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.246-248
    • /
    • 2021
  • Recently data has been transformed into a data economy and society that acts as a catalyst for the development of all industries and the creation of new value, and COVID-19 is accelerating digital transformation. In the upcoming intelligent Internet of Things era, the availability of decentralized systems such as blockchain and mixnet is emerging to solve the security problems of centralized systems that makes it difficult to utilize data safely and efficiently. Blockchain manages data in a transparent and decentralized manner and guarantees the reliability and integrity of the data through agreements between participants, but the transparency of the data threatens the privacy of users. On the other hand, mixed net technology for protecting privacy protects privacy in distributed networks, but due to inefficient power consumption efficiency and processing speed issues, low cost, light weight, low power consumption Internet Hard to use. In this paper, we analyze the limitations of conventional mixed-net technology and propose a mixed-net technology method for low power consumption, high speed, and the Internet of things.

  • PDF

Decentralized LTL Specifications for Ensuring Quality of Interaction-centralized System (상호 작용 중심 시스템의 품질 확보를 위한 LTL 분산 명세)

  • Kwon, Ryoungkwo;Kwon, Gihwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.5
    • /
    • pp.169-178
    • /
    • 2014
  • In this paper, we present a research utilizing decentralized LTL specifications for ensuring a quality for interaction-centralized system. In this system, for ensuring the quality, we need to validate interactions between modules of the system and then we should check whether the system achieves the expected requirements. This task remains difficult and labor-intensive and requires an expert. In this paper, we present a method to assist such a task. First of all, the requirements of the system is written as multiple LTL specifications. Interactions between modules mean that behaviors of one module are related with other one's behavior. We generate the automaton model fully achieving specification through GR(1) synthesis. And we simulate them using the simulator based on the software agent for checking behaviors of the system. Finally, we validate the whole system whether it achieves given requirements.