The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The sybil problem is a fundamental problem in distributed systems and online social networks (OSNs). The basic problem is that an attacker can easily create multiple identities in a distributed or open online system. Popular and effective sybil defenses are usually based on properties of the network structure. However, most defenses assume that it is hard for the attacker to make many connections...
This study presents a content control application usage on smartphones which can improve collaboration between children and parents. The importance of the parents' role is to provide a comprehension regarding the content of the application to children will make good communications between parents and children. So, the children can think and make decisions on something that they face. Parental control...
Neighbor discovery protocol (NDP) is the core protocol of Internet protocol version 6 (IPv6) suite. The motive behind NDP is to replace address resolution protocol (ARP), router discovery, and redirect functions in Internet protocol version 4. NDP is known as the stateless protocol as it is utilized by the IPv6 nodes to determine joined hosts as well as routers in an IPv6 network without the need...
Thermal power of nuclear reactor needs to be carefully maintained to produce desired electrical power. While in-core measurement system has a higher safety risk, ex-core measurement has been employed to increase safety. Artificial neural network with multi-layer perceptron architecture and Bayesian regularization algorithm has been trained and tested for estimating the thermal power at G.A. Siwabessy...
High performance computing (HPC) devices is no longer exclusive for academic, R&D, or military purposes. The use of HPC device such as supercomputer now growing rapidly as some new area arise such as big data, and computer simulation. It makes the use of supercomputer more inclusive. Today's supercomputer has a huge computing power, but requires an enormous amount of energy to operate. In contrast...
Software-Defined Network (SDN) architecture offers many advantages related to flexibility, higher network programmability and simplicity of application service development. On the other hand, this architecture leaves a number of issues related to scalability, reliability and performance (such as delay and control communication overhead) to be applied to large-scale networks such as the Service Provider...
The operation of oil well drilling is essential for the production of oil and gas it is the key process in huge oil and gas production and exploration industry that oil well drilling takes place in a wide range of geographical and climate environment operating in both offshore and onshore. Phenomena that may cause deprived operational performance and even develop into the catastrophic failure of the...
For a successful communication in a LAN network Internet Protocol version 4 (IPv4) has to identify Machine Code Address (MAC) of the target host which was possible via using Address Resolution Protocol (ARP). This is improved in IPv6 in which nodes uses Neighbor Discovery Protocol (NDP) to access MAC address of other nodes. In addition to this it enables accessibility to routers and reachability of...
This paper considers the problem of deriving a Time Division Multiple Access (TDMA) link schedule for a single-channel, Multi-Transmit or Receive (MTR) Wireless Mesh Network (WMN). This problem is significant because a short schedule means the WMN has a higher network capacity. We first show that an existing solution, called Directed Edge Coloring (DEC), to channel assignment developed for WMNs with...
The development of social media, especially Twitter is growing rapidly. Twitter is usually used to comment on a product, a person or even a television program. The written comments by Twitter users can reach hundred thousand or even millions every day. By using the comments obtained from Twitter, it can complement a television program assessment that usually done by using rating, which only represented...
Institutions hassles to accommodate a large of student that couldn't passed in normal study period. Some of them pending the study period because couldn't passed TPB in two semesters. If many students didn't graduated on time, it would be a lot of difficulties involved by institutions. The impact of these problems such as human resources, supplying classroom and operational costs. This research tries...
Interactive media using application is a solution to provide early childhood learning in today's technological era, one in the introduction to read. Based on the results of a survey conducted on an application of learning to read using a quality in use integrated measurement factor indicates there are deficiencies in the application of user task and usability. The impact of the shortage of implementation...
In mobile ad hoc networks (MANETs), nodes usually have limited radio power and transmit in a very limited area. Communication beyond a node's radio range requires multiple hops between nodes, which in turn, requires nodes in MANETs to cooperate with each other in forwarding packets from a source to a destination. Problems in cooperation arise in self-organizing MANETs where selfish nodes exist. Selfish...
Recently, thick haze and poisonous smoke has cloak the surrounding air in Malaysia due to the uncontrollable and unethical burning of nearby country. This devastating episode of open burning started in the year 1997 in Indonesia which deeply affected most of the ASEAN countries especially their neighbour Malaysia and Singapore. The Photovoltaic (PV) technology as an alternative means of energy generation...
The emergence of Internet of Things (IoT), the IEEE 802.15.4 standard introduces wireless sensor network (WSN) from personal area network (PAN) into low power personal area network (LoWPAN). Hence, the use of Internet Protocol (IP) into LoWPAN has broadened new research area known as 6LoWPAN. Nowadays, 6LoWPAN technology is swiftly gaining recognition for its extensive application, ranging from healthcare...
There is a growing perception among communications experts that IPv6 and its associated protocols is set to soon replace the current IP version. This is somewhat interesting given that general adoption of IPv6 has been slow. Perhaps this can be explained by the short-term fixes to IPv4 address including classless addressing and NAT. Because of these short-term solutions in addition that IPv4 is not...
Since, IPv6 is the new version of Internet Protocol (IP), there are still many researches required to be undertaken in this area. So, it is necessary to take part and make this protocol more efficient and capable for a better deal with the future Internet demand. The problem behind this research is lack of IPv6 network for the research committee at Universiti Kebangsaan Malaysia (UKM). This research...
Customer churn is a major problem that is found in the telecommunications industry because it affects the company's revenue. At the time of the customer churn is taking place, the percentage of data that describes the customer churn is usually low. Unfortunately, the churn data is the data which have to be predicted earlier. The lack of data on customer churn led to the problem of imbalanced data...
6LoWPAN has become a new technology to provide the internet connectivity to the traditional wireless sensor network. The introduction of 6LoWPAN adaptation layer enables the smooth delivery of packet from network layer to MAC layer. In this paper, the AODV-based routing protocol with the proposed route break position for fragmented and unfragmented packets in 6LoWPAN networks is introduced. The proposed...
This paper compares between android and iPhone Operating System (iOS) mobile operating systems (MOS) that available in the market which is more specific on the security issue. These issues are reportedly the concern of not only the mobile customers but also the software developers. In achieving security requirements, the MOS developers need to know how to achieve the criteria. The security requirements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.