![]() ![]() The joint optimization of power control and energy harvesting scheduling is investigated in time-varying IoD networks to minimize the long-term average system energy cost constrained by the drone battery capacities and quality of service (QoS) requirements. In this talk, the speaker utilizes energy harvesting technology to charge drone batteries and investigate wireless power control to adjust the drone wireless transmission power to reduce drone energy consumption. The speaker will share her vision and research to address these two challenges. Also, aggregating all data in the fog node may incur huge network traffic and drone data privacy leakage. ![]() However, the performance of IoD is greatly affected by drones’ battery capacities. Fog-aided IoD provisions future events prediction and image classification by machine learning technologies, where massive training data are collected by drones and analyzed in the fog node. Internet of drones (IoD), which deploys several drones in the air to collect ground information and send them to the IoD gateway for further processing, can be applied in traffic surveillance and disaster rescue. Intelligent and Secure Fog-Aided Internet of Drones Xiao has been awarded several grants by the NSF, NSA, and the Army Research Office (ARO). Xiao’s research was recognized in different venues, including publications that won the best paper award at the USENIX Large Installation System Administration Conference (LISA) 2015, won the distinguished poster award at the Network and Distributed System Security Symposium (NDSS) 2016, and won the best paper award nomination at the International Conference on Dependable Systems and Networks (DSN) 2020. Prior to joining Boise State University, he spent approximately 5 years in industry working at Intel and Symantec.ĭr. He received his PhD degree in computer science from the College of William and Mary. His research focuses on computer security, especially computer system security and cloud security. Jidong Xiao is an assistant professor in the computer science department at Boise State University. At the end of the talk, I will briefly discuss my future research projects and plans.ĭr. In the second project, I will present a new type of rootkit, which allows attackers to perform active or passive attacks in a nested virtualization environment, and then I will describe our detection approach. In the first project, I will present a concept called virtual machine extrospection, in which attackers or cloud customers collect sensitive information about the physical machine from within a virtual machine. In this talk, I will present two research projects. While individuals and organizations rely on cloud computing more and more, various security problems in cloud platforms are discovered. The Office of Educator Excellence (OEE) is responsible for the implementation of Michigan's educator evaluation legislation by providing support to districts (including local education agencies (LEAs), ISDs, and PSAs) and educators across the state.Identifying New Threats in Cloud EnvironmentsĬloud computing has become prevalent over the past decade. Uses the evaluations to inform decisions regarding effectiveness, promotion, retention, development, whether to grant tenure or full certification, and the removal of ineffective tenured and untenured teachers and administrators.Establishes clear approaches to measuring student growth and provides relevant data on student growth.Evaluates job performance at least annually while providing timely and constructive feedback.Michigan Compiled Law (MCL) 380.1249 requires the board of a school district or intermediate school district (ISD) or the board of directors of a public school academy (PSA) to adopt and implement for all teachers and administrators a rigorous, transparent, and fair performance evaluation system that does all the following: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |