The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To guarantee the safety of big data calculation, the concept of security research and trusted cloud combined with large data security, a two-way defense system model of a large data calculation of SAT. The model of user data evidence through the dynamic safety factor; gradually determine the behavior of security permissions according to the reliability test implementation behavior. Provide the maximum-security...
Operating system platform of the intelligent equipment of current mainstream and traditional PC gradually evolved into Windows, IOS and Android camps. Among intelligent equipment, Android & IOS due to openess and flexibility got the initiative, while Windows has been in worse situation. But with the Microsoft Windows 8 & Windows phone 8, the pattern of the future may change dramatically...
The key technology of data fusion and data mining in wireless sensor network has been addressed, and then the tropical crop monitoring system based on data fusion and data mining is proposed, which can collect the perception information from source node in the network efficiently. To real-time monitor and control the tropical crop within the perception regional, the knowledge mining technologies,...
The power of wireless sensor network node is usually provided by a dry battery, which the power energy is limited, and the life cycle of wireless sensor network is determined by the battery directly. On the basis of the analysis of energy-saving mechanism of wireless sensor networks, have come up with a plant electrolyte power, a new renewable energy, which attains energy from the electrolytes in...
Monitoring data of recent years from Symantec Company shows Botnet is becoming the base of all network crime. As P2P is being more widely used these days, some new Bots use P2P protocols to construct command and control system. This paper introduces Botnet detection methods, studies detection mechanism towards P2P Botnets based on user behavior, and proposes a new case to identify P2P Botnet. To test...
In vehicular ad hoc network, the disconnection of the multi-hop routing is frequently when nodes move in opposite direction with fast speed. This paper proposes a new reliable routing protocol for vehicular network--DAODV, in which the intermediate node could judge the motion direction when establishes the routing. When source node sends the routing request information, its motion information is also...
User authentication is very important to information security. In this paper, we present an economical hash-based strong password authentication scheme by using of a popular removable storage device. With the help of the new scheme, the user can ??remember?? a random number that is not only a part of the user's ID but also a part of user's password, which makes the scheme to be one-time ID and one-time...
Traditional transport protocols suppose that packet losses are mainly due to congestion. However, wireless networks are characterized by losses due to transmission errors occurring frequently. Traditional TCP interprets these losses as congestion and invokes congestion control mechanisms resulting in degradation of performance. In this paper, we introduce two mechanisms to improve performance of TCP...
Hybrid simulation model which combines the fluid model and packet-level simulation together can integrate advantages of the two methods. This paper proposes the frame of the hybrid model based on the fluid model proposed by Vishal Misra, and proposes implementation of the hybrid model within NS-2 in detail. When using the hybrid model, we adopt packet-level simulation for the subnet that needs detailed...
Fourth Generation (4G) mobile communications should not only focus on data rate increase and novel air interface, 4G mobile should converge the advanced wireless communications and high-speed wireless access. Considering the performance and cost, our research is now focusing on WLAN access. In order to study the 4G mobile handsets and other parts, we need a platform. Because no device provider could...
In this paper, we present the PNCO, a partial network coding for multicast communications in wireless network under opportunistic routing. PNCO presents a low complexity algorithm for intra-flow network coding for wireless network. This metric breaks the whole file into blocks of K packets. It only randomly mixes packets of the current block then forwards them. As soon as the destination node decodes...
This paper proposes an achievement-based educational framework for teaching the network security course. We designed around a series of counter-activities of experiment, in which the students are divided into several groups, and their task is to attack and anti-attack each other, the winner will have a high score and a feeling of achievement. In contrast to just e-learning, the novel achievement-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.