The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Efficient, seamless and secure handover for mobile nodes in overlay heterogeneous networks is a main goal of mobility management. Mobility management can be classified into macro-mobility and micro-mobility management. The former handles the movement of a node between any two IP addresses and the later focuses on the handover between different access points within a single domain. Host Identity Protocol...
This paper presents a new architecture for optical burst switched networks where the control plane of the network functions in a cooperative manner. Each node interprets the data conveyed by the control packet and forwards it to the next nodes, making the control plane of the network distribute the relevant information to all the nodes in the network. A cooperation transmission tree is used, thus...
E-Learning systems in Arab countries necessitate technology for the purpose of detecting plagiarism in Arabic. Although search engines such as Google can be utilized, there would be tedious efforts to copy some sentences and paste them into the search engine to find similar resources. For that reason, developing Arabic plagiarism detection tool for e-learning systems facilitate and accelerate the...
The purpose of this paper is to determine the causes of the low performance companies operating in the information technology sector, as a key driver of the Romanian economy. A model was designed to extract the productivity distribution of the sectorpsilas companies based on a data set from the Romanian Chamber of Commerce and Industry.Through the statistical analysis of this particular sub-sample,...
This paper discusses the activating role of e-Governments in the Arab countries, by seeking new rules and innovative ways to provide services to the public sector. It starts from the analysis of different stages and dimensions of e-government through better understanding of the phenomenon and investment of opportunities in Information Technology in order to develop the role of governments and departments...
There is a huge prevalence of mobile devices being connected to the Internet because of high demands for information access and dissemination. It is now well understood that XML plays a vital role as a means for information representation, exchange, and storage. Naturally, XML data is exchanged and stored as these mobile devices communicate with each other, and over the web. A major concern for one...
Resource reservation protocol (RSVP) is used to sufficiently reserve the resources between fixed endpoints. To support it for host mobility, several methods have been proposed in the literature to address the challenging problems of minimizing the handoff resource reservation delays and wastage of resources. Although, these methods minimize intra-subnet handoff resource reservation delays with minimum...
Inception stage of devastating attacks like DDoS attacks and botnet hosted attacks includes compromising numerous computers or networks over the Internet. The Port scanning tools are often used by the attackers not only to identify the vulnerable servers but also to identify the vulnerable network or vulnerable computers over the Internet. If the attackers can identify a single vulnerability then,...
Denial of Service is becoming a growing concern. As our systems communicate more and more with other that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up our resources and disable our servers. Since these attacks occur before parties are authenticated...
The adoption of community wireless has become a growing trend in both metropolitan and rural areas around the world. However, understanding the usage motivations and the unintended effects that those technologies have on communities is limited particularly for rural users. The purpose of this study is to explore the benefits and usage of an asynchronous wireless Internet system in a rural village...
The increasing number of applications offering their services over peer-to-peer (P2P) platforms is changing the properties of the traffic within computer networks. Their massive use raises a few imperative challenges for network administrators and Internet service providers, regarding the quality of service and security of their networks. It such scenario, it is important to develop mechanisms to...
Mobility of user devices connecting to the Internet is of major interest in today's research in networking. For users as well as for applications, network mobility should be transparent. Reliable transport protocols like TCP has served well the wired Internet where the packet losses are mainly due to congestion, but is not ready for mobile IP wired-cum-wireless environments where the significant packet...
Web mining is defined as applying data mining techniques to the content, structure, and usage of Web resources. The three areas of Web mining are commonly distinguished: content mining, structure mining, and usage mining. In all these areas, a wide range of general data mining techniques, in particular association rule discovery, clustering, classification, and sequence mining, are employed and developed...
The United States electricity grid faces significant problems resulting from fundamental design principles that limit its ability to handle the key energy challenges of the 21st century. We propose an innovative electric power architecture, rooted in lessons learned from the Internet and microgrids, which addresses these problems while interfacing gracefully into the current grid to allow for non-disruptive...
A variety of file replication algorithms are proposed for Data Grids in the literature. Most of these algorithms ignore real-time Grid applications which are emerging in many disciplines of science and engineering today. Thus, it is important to study and improve the real-time performance of these file replication algorithms. Based on this motivation, in this study, performance of four replication...
The Web has become an important medium for access to information and users increasingly depend on it for their routine activities. Hence, the demand for higher quality services has grown strong and overload control has become a key problem to be addressed in Web servers. This paper analyzes the implementation of a fuzzy admission controller in a QoS-enabled Web server architecture and compares its...
The purpose of this investigation is to know which are the factors that define the different Websites belonging to those supermarkets that sell its products through the Internet in Spain. For it there is realized an analysis of content, in which there are examined both the parameters that help to the buy of products of nourishment in the Net, and the formal aspects that characterize the trade in each...
The paper discusses the utilization of wireless technologies at telecentres in bridging the digital and knowledge divide whereby the research employed quantitative and qualitative research methods to 100 respondents in Perak and Terengganu. The findings are discussed with reference to the take up rate and adoption patterns of wireless technology. The quantitative analysis indicates high use of wireless...
The deployment of mobile and ubiquitous computing in smart objects introduces the concept of an Internet of things which will offer new scenarios for learning processes. This paper presents this concept in relation with some other new alternatives of spaces for learning. A basic architecture for interaction is proposed and a set of prototypes that we have developed are also explained as part of an...
Agent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a very serious threat to the network security. This paper proposes a protocol that is used to detect the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.