Real Time Implementation of Terminal Security Policies Selection Based on Edge Computing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Real Time Implementation of a License Plate Location Recognition System Based on Adaptive Morphology

License plate recognition (LPR) by using morphology has the advantage of resistance to brightness changes; high speed processing, and low complexity. However these approaches are sensitive to the distance of the plate from the camera and imaging angle. Various assumptions reported in other works might be unrealistic and cause major problems in practical experiences. In this paper we considered ...

متن کامل

Research and implementation on cloud computing security based on HDFS

This paper focuses on the research of the cloud computing security, proposing the file data management model and implementing the security of the cloud computing based on HDFS. The design of the file data management system under the cloud computer environment is achieved based on HDFS, which is with the functions of upload and download data parallelism, user management, inventory management, et...

متن کامل

Implementation of Scheduling Policies in Real-Time Mach

Future advanced applications will require new types of objects such as continuous media objects and distributed objects[3, 1]. Such requirements will stress operating systems ability to support various levels of timeliness, reliability and performance. A single computational model and resource management policy may not cover conflicting users requirements. Therefore, an extensible operating sys...

متن کامل

Arm Based an Real Time Implementation Based on Transportation Systems

The main idea behind this project is to develop a system which can detect drowsiness of the driver and giving an indication in the form of alarm. Since a large number of road accidents occur due to the driver drowsiness, here we are proposing a new transportation system which will reduce the accidents. This system will monitor the driver’s eyes using camera and face detection which is very impo...

متن کامل

Reconfigurable Security: Edge Computing-based Framework for IoT

In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security. We then introduce a new reconfigurable security framework based on edge computing, which utilizes a near-us...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics: Conference Series

سال: 2020

ISSN: 1742-6588,1742-6596

DOI: 10.1088/1742-6596/1646/1/012061