The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dynamic fuzzy rule interpolation (D‐FRI) technique delivers a dynamic rule base through the utilisation of fuzzy rule interpolation to infer more accurate results for a given application problem. D‐FRI offered dynamic rule base is very useful in security areas where network conditions are always volatile and require the most updated rule base. A honeypot is a vital part of any security infrastructure...
This paper presents the design and implementation of an inexpensive and generic Spectrum Alerting System (SAS), based on Software Defined Radio (SDR), by using the RTL-SDR USB device and a low- power microprocessor Raspberry Pi. The main aim of the SAS is within a defence surveillance system for discovering rogue or unidentified signals in an attentive spectrum, sending alerts to the signals intelligence...
Big data processing is progressively becoming essential for everyone to extract the meaningful information from their large volume of data irrespective of types of users and their application areas. Big data processing is a broad term and includes several operations such as the storage, cleaning, organization, modelling, analysis and presentation of data at a scale and efficiency. For ordinary users,...
The standard and real-time communication technology is an unalloyed inevitability for the development of Internet of Things (IoT) applications. However, the selection of a standard and effective messaging protocol is a challenging and daunting task for any organisation because it depends on the nature of the IoT system and its messaging requirements. Copious messaging protocols have been developed...
In the present industrial world, Programmable Logic Controllers (PLCs) are playing a vital role. A Programmable Logic Controller is a solid state user programmable control system with functions to control logic, sequencing, timing, arithmetic data manipulation and counting capabilities. As the applications are becoming more and more complex, the single-core PLCs are unable to meet the high speed execution...
The majority of computer systems use security software/hardware to protect against cyber attacks. A firewall is one the most popular security systems to protect against unauthorized access to or from its hosted network/system. The Microsoft Windows Operating System (OS) is equipped with an intrinsic firewall utility, which has been enhanced over the years to offer advanced security features including...
Dynamic fuzzy rule interpolation (D-FRI) consists of functionalities of fuzzy rule interpolation and dynamically refinement of the fuzzy rule base. It can be integrated with any fuzzy intelligent system to extend the system's capabilities in addition to its normal fuzzy reasoning. Systems security is one of the areas that require dynamic monitoring due to the nature of possible threats; static rule-based...
Enterprises have recognised the importance of personal mobile devices for business and official use. Employees and consumers have been freely accessing resources and services from their principal organisation and partners' businesses on their mobile devices, to improve the efficiency and productivity of their businesses. This mobile computing-based business model has one major challenge, that of ascertaining...
Software crowdsourcing emerged from the crowdsourcing concept and inherited most of features from it. However, it adapted its nature according to the requirements of software engineering techniques and technologies. Therefore, it is important to understand the detailed elucidation of software crowdsourcing. This paper introduces the connotation of CROWD (Community, Remoteness, Open-call, Web, Diversity)...
Access to computer systems and the information held on them, be it commercially or personally sensitive, is naturally, strictly controlled by both legal and technical security measures. One such method is digital identity, which is used to authenticate and authorize users to provide access to IT infrastructure to perform official, financial or sensitive operations within organisations. However, transmitting...
Native Web communication protocols are the pivotal components of Web services, applications and systems. In particular, HTTP is a de facto protocol standard used in almost all Web services and systems. Consequently, it is one of the crucial protocols responsible for the performance of Web services and systems. HTTP/1.1 has been successfully deployed in Web services and systems for the last two decades...
Multi-cloud systems have been gaining popularity due to the several benefits of the multi-cloud infrastructure such as lower level of vendor lock-in and minimize the risk of widespread data loss or downtime. Thus, the multi-cloud infrastructure enhances the dependability of the cloud-based system. However, it also poses many challenges such as nonstandard and inherent complexity due to different technologies,...
Big Data security analysis is commonly used for the analysis of large volume security data from an organisational perspective, requiring powerful IT infrastructure and expensive data analysis tools. Therefore, it can be considered to be inaccessible to the vast majority of desktop users and is difficult to apply to their rapidly growing data sets for security analysis. A number of commercial companies...
This study is about the disastrous flooding of an Indian metropolitan area of Chennai when the rain had nearly broken the record of 100-years with 374 mm rain falling on December 1, 2015, virtually breaking the November monthly average of 407.4 mm in a day. This city with a population of approximately 6.7 million people came to a standstill. Astonishingly, one of the biggest software development hubs...
The software industry has been embracing the multi-cloud infrastructure for the design and adaptation of complex and distributed software systems. This new hybrid cloud infrastructure makes it possible to mix and match platforms and cloud providers for various software development activities. There are several benefits of the multi-cloud infrastructure such as lower level of vendor lock-in and minimize...
The exigency of data analysis has been accelerating for routine operations in organizations. Every organization gathers a large amount of heterogeneous data every day. Subsequently, they develop their current and future strategies based on the analysis of the collected data. However, most small and medium organizations have been dealing with two major issues in the field of data analysis: requirements...
Virtualization is the nucleus of the cloud computing for providing its services on-demand. Cloud-based distributed systems are predominantly developed using virtualization technology. However, the requirement of significant resources and issues of interoperability and deployment make it less adopt- able in the development of many types of distributed systems. Dockerization or Docker Container-based...
Firewall is a standard security utility within the Microsoft Windows operating system. Most Windows users adopt it as the default security option due to its free availability. Moreover, Windows Firewall is a widely used security tool because of the large market share of the Microsoft Windows operating system. It can be customised for filtering of network traffic based on user-defined inbound and outbound...
Cloud computing enables businesses to use computing resources on-demand anywhere in the world without having to build and maintain computing infrastructures in-house. This model involves multiple parties performing diverse operations via the Internet across multiple organisations. Employees and consumers can access resources and services from their own and associated organisations. Despite the success...
Application of fuzzy rule interpolation (FRI) has been escalating for making intelligent systems viable in many areas. However, requirements of such systems may change over time and the supporting static rule base may not be able to provide accurate interpolation results in the long run. Dynamic fuzzy rule interpolation (D-FRI) is one of the potential solutions for this problem, a such has been developed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.