The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the attacks on the website and domain names are increasing day by day it becomes very important for various verticals in the country to be secured against the deadly attacks which can hamper the operations of the web traffic in the country and its verticals. XSS is one such attack which is more frequently tried on the websites to gain information and data which is relevant to the attacker from...
Push To Talk (PTT) is a half duplex communication system which can be used to perform either one to many group calls. Since 1997, PTT has been deployed over Terrestrial Trunked Radio (TETRA) network for mission critical military and civilian use. The cost of operation and maintaining a Tetra network runs into billions of pounds. Hence governments around the world are looking to share the existing...
Push To Talk (PTT) is a half duplex communication system which can be used to perform either one to many group calls. Since 1997, PTT has been deployed over Terrestrial Trunked Radio (TETRA) network for mission critical military and civilian use. The cost of operation and maintaining a Tetra network runs into billions of pounds. Hence governments around the world are looking to share the existing...
This article provides an overview of a monitoring application, its testing and validation process. The application was developed for the detection of sub-synchronous oscillations in power systems, utilizing real-time measurements from phasor measurement units (PMUs). It uses two algorithms simultaneously to both detect the frequency at which the oscillatory event occurs and the level of energy in...
We propose a novel approach that merges implied scenarios and race condition analysis techniques, to systematically detect and analyse security-related vulnerabilities at the architectural level. We apply our approach to an industrial case related to architecting systems interfacing the cloud. The application demonstrates an effective use of the approach, where the approach has detected securityrelated...
This paper presents the architecture, design and implementation of an email server that runs on a bare PC without an operating system or hard-disk. In addition to providing standard services offered by conventional email servers, the bare PC email server incorporates several unique features leveraging the absence of an operating system. For example, it implements novel algorithms for optimal multi-tasking,...
Desktop Grids are rapidly gaining popularity as a cost-effective computing platform for the execution of applications with extensive computing needs. As opposed to grids and clusters, these systems are characterized by having a non-dedicated infrastructure. These unique characteristics need to be considered in developing resource management strategies for Desktop Grids. Several frameworks for the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.