The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The replication and dissemination of multimedia data become increasingly convenient and efficient, so a lot of redundant multimedia data, especially image files, have been generated and stored on the Internet. Therefore, it is necessary to perform deduplication of images. However, the existing deduplication methods of regular files are hash-based, which cannot be applied to the deduplication of images...
Mobile and smart health care exists some questions and challenges including signs and symptoms information collection, remote real-time detection and online information push. In this paper, remote network vital sign information monitoring system and cloud data storage platform is designed and implemented to solve the problems mentioned above. The system is realized based on STM32 wearable hardware...
With the development of software-defined networking (SDN), people start to realize that the protocol-dependent nature of OpenFlow, i.e., the matching fields are defined according to existing network protocols (e.g., Ethernet and IP), will limit the programmability of forwarding plane and cause scalability issues. In this work, we focus on Protocol-Oblivious Forwarding (POF) [1], which can make the...
In recent years, with the growth of P2P software, the operation mechanism has been much diversified. It is very difficult to classify P2P flow and normal flow based on single testing method. The increasing number of encrypted P2P protocols posed big challenge to testing. This thesis analyzes the identifying method for P2P flow based on port number, payload signature inspection, reverse connection...
RFID technology is an object identification technology which will become promising and ubiquitous attracting a lot of research attentions. But due to the open-medium nature of the radio communication and the simple structure of RFID tags, most RFID systems have to be tethered to a backend database and prone to tag tracing attacks which will lead to user privacy leakage. In this paper, we propose a...
In a typical BitTorrent swarm, a large proportion of the peers are behind firewalls or NATs. These peers are called unconnectable. When developing P2P applications, a main requirement is to handle unconnectable peers appropriately. One important aspect of this problem, which has not been emphasized so far, is understanding the difference between the attributes of unconnectable peers and peers in the...
Since the late 1980s, the simple network management protocol (SNMP) as the Internet management standard has been developed. The management of IP networks has exclusively relied on the SNMP. But the SNMP management framework has some weaknesses especially related to extensibility configuration management and efficient application development processes. Today, researchers and developers in the network...
With the rapid development of network technology, the traditional centralized network management can't meet the needs of network management any more. So network management will evolve from centralized model, where all the management functions take place on a single network management station, to distributed models where management functions are distributed over a large number of nodes. In this paper,...
Aiming at automated security test on communication protocols, this paper proposes an automated manipulation mechanism of testing procedure based on FSM (Finite State Machine), and designs an automated packet generation mechanism based on a protocol template library. The practical experiments and applications show that the automated security testing platform of communication protocols based on this...
In the rapid development of global market, there is an urgent need for manufacturing enterprises of China to provide training to its employees to ensure their continuous competence in handling their task. E-learning systems provide a variety of instructional aids and communication methods, and offer learners great flexibility as to the time and place of instruction. Given these advantages, it is not...
Location service provides position of mobile destination to source node so that position based routing can be applied. Several quorum-based location services have been proposed. These location service protocols suffer from complex structure with high overhead, or host location foreknowledge, and difficulty in quorum construction. To overcome those deficiencies, we propose a novel quorum-based location...
Anti-islanding protection of distributed generation (DG) is a significant technical barrier for the DG industry. This paper presents an innovative agent brokering-based anti-islanding scheme developed in response to the challenge. The scheme enables relay operational signals to be transferred to downstream DG units for coordinating their connection status using the multi-agent system (MAS) technology...
In this paper, we present the technique to manage user profiles and authentication using LDAP (lightweight directory access protocol). The user profiles maintained in the LDAP directory information tree (DIT) which contains various information about users. This information can be retrieved by the users depending upon the level of access provided to them on the network. Various services use this authentication...
Web services are software components defined by WSDL, registered by UDDI and invoked by SOAP protocols. The port used by Web services and SOAP is not typically blocked by conventional firewalls. Therefore, a new type of firewall named Web service firewall or XML firewall is required. There are a number of commercial Web service firewall products. Several academic projects have also been done on Web...
A growing array of biotechnologies is being used to study the genetics of complex biomolecular traits in laboratory mice as models for human disease. Combined analysis of these datasets provides much of the power of the approach of functional genomics but this depends on the ability of databases to exchange data with each other and with analytical software. In the light of these challenges the European...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
The development of microarray technology has been phenomenal, during the past years, and it is becoming a daily tool in many genomics research laboratories. However, the multi-step and data-intensive nature of this technology has created an unprecedented computational challenge. In fact, the full power of microarrays technology can only be achieved if researchers are able to efficiently store, analyse...
With the situation that electric power system is becoming highly automatic, various control equipment designed for each part of electric power system(such as power generating station, substation, transmission lines and etc.), and for the control and regulation of each controlled object(such as power, voltage, frequency, phase and etc) have been applied in electric power systems. With the electric...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.