The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Establishing the proper values of controller parameters is the most important thing to design in active queue management (AQM) for achieving excellent performance in handling network congestion. For example, the first well known AQM, the random early detection (RED) method, has a lack of proper parameter values to perform under most the network conditions. This paper applies a Nelder-Mead simplex...
The massive internet usage is followed by the rise of cyber-related crime such as information stealing, denial-of-service (DoS) attack, trojan and malware. To cope with the threats, one of most popular choice is using Intrusion Detection System (IDS). The logs produced by IDS in a day is huge and the limitation of computing power is the main problem to process that logs files. In this paper, we propose...
The emergence of photoplethysmography for blood pressure estimation is offering a more convenient method. The elements of photoplethysmography waveform is crucial for blood pressure measurement. Several photoplethysmography elements are still not completely understood. The purpose of this study was to investigated corelation of photoplethysmography elements with blood pressure using statistical approach...
A recent study shows, an investigation of Advanced Persistent Threat (APT) activity can be done effectively through malicious DNS traffic analysis. But, most of the experiments are conducted in a limited, simulated environment e.g. small campus network. Since APT is very dynamic and to address traffic grows, a light weight computation architecture is then needed to profile suspected activity in near...
Blood pressure is an important parameter for early detections of cardiovascular diseases. There have been many relevant technological advances to measure blood pressure, such as in wearable sensing, pervasive computing, and smartphones. The disadvantage of conventional measurement is discomfort for the patients because of painful cuff inflation. The emergence of photoplethysmography for blood pressure...
Iris recognition offers unique pattern as a biometric authentication. Iris has advantages in term of universality, distinctiveness, permanence, and collectability. This research proposed implementation of half polar iris localization and normalization to improve performance of iris recognition that is detected using modified low cost camera. In the development phase dataset from CASIA-IrisV1 is used...
An activity of Advanced Persistent Threat (APT) is very dynamic. A single detection method will be ineffective. New modus and techniques are being developed rapidly and overcome the effort to acknowledge it. This design proposed a new approach through a combination of previous successful detection method based on DNS traffic analysis altogether, to address today's APT challenges. A preliminary experiment...
In this paper, we propose a new color image encryption method using color scrambling based on the chaotic permutation multiple circular shrinking and expanding (CPMCS/ CPMCE). The plain color image with a size of m x n x 3 is arranged in two-dimensional array, where each row consists of the Red, Green, and Blue (RGB) component, forming two-dimensional array with a size of m x 3n. The arranged 2D array...
IDS capability in detecting an attacks is highly dependent on the accuracy of attack detection which usually is represented by the least number of false alarms. In this work we simplify the large network dataset by selecting only the most important and influential features in the dataset to increase the IDS performance and accuracy. The creation of smaller dataset is aimed to decrease time for training...
Many computer-based devices are now connected to the internet technology. These devices are widely used to manage critical infrastructure such energy, aviation, mining, banking and transportation. The strategic value of the data and the information transmitted over the Internet infrastructure has a very high economic value. With the increasing value of the data and the information, the higher the...
In the image encryption, chaotic map usually used for pixel permutation, due to it can generate chaotic permutations hence difficult to predict. However chaotic map which is widely used for image permutations like Arnold Cat Map (ACM) has a relatively low recurrence period so vulnerable to the known image attack. Besides, the key space Arnold cat map is also relatively low so vulnerable to brute-force...
An implementation scheme of speech recognition over Internet called network speech recognition (NSR) can use TCP to ensure the reception of speech data on the server so that the accuracy of recognition obtained could be better. Although TCP can not guarantee the timeliness of data delivery as required by multimedia streaming applications, NSR prefer to receive the whole speech data to be recognized...
While structured peer-to-peer (P2P) offers benefits on its scalability and efficiency in performing a successful query lookup, its stability is suffered from the dynamics of the overlay structure caused by churn. In a structured hierarchical P2P, in addition to potential decreases of the system performance, the superpeer failure cases also forced the normal peers under its responsibility to disconnect...
Broadband PLC network is potentially used to deploy synchrophasor-sensor network in monitoring and distributedly controlling the electric power distribution network in order to accelerate power grid into smart grid transform. However, data traffic characteristic is largely affected by either electric power system dynamics or electric power load variation. Therefore, the statistical data information...
The interoperable capabilities between the mixed WLAN standards in the environment of hybrid network are subject to be discussed. In this case, the extended fiber link may achieve 21.7 km. Among the modulations and the access methods applied, it shows that the delay bound of 802.11g DSSS-OFDM 54 Mbps is reasonable, however, it offer the highest data rate.
The Scilab is freeware as launched by INRIA and ENPC. This paper explains the experience result of the simulation by Scilab to simulate RFID-based for red light violation detection. This simulation gives evidence of violation and prediction of vehicle flow. The violation can detect if the vehicle's IDs have moved form one RFID Reader to the others. The flow prediction is executed by channel forward...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.