The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the biggest problems of today's internet technologies is cyber attacks. In this paper whether DDoS attacks will be determined by deep packet inspection. Initially packets are captured by listening of network traffic. Packet filtering was achieved at desired number and type. These packets are recorded to database to be analyzed, daily values and average values are compared by known attack patterns...
System monitoring is an established tool to measure the utilization and health of HPC systems. Usually system monitoring infrastructures make no connection to job information and do not utilize hardware performance monitoring (HPM) data. To increase the efficient use of HPC systems automatic and continuous performance monitoring of jobs is an essential component. It can help to identify pathological...
Due to the high cost and high power consumption problem of the present smart home server, we designed and implemented a home server based on embedded system, mainly developed by ARM11 for a hardware platform, Linux system for operating system, SQLite database and BOA server for a software platform. The home server has successfully implemented the network communication, SQLite database peration and...
In order to take a consistent snapshot of a distributed system, it is necessary to collate and align local logs from each node to construct a pairwise concurrent cut. By leveraging NTP synchronized clocks, and augmenting them with logical clock causality information, Retroscope provides a lightweight solution for taking unplanned retrospective snapshots of past distributed system states. Instead of...
SOS is a new model for the online in situ characterization and analysis of complex high-performance computing applications. SOS employs a data framework with distributed information management and structured query and access capabilities. The primary design objectives of SOS are flexibility, scalability, and programmability. SOS provides a complete framework that can be configured with and used directly...
In this paper, we present Smartphone-based Contactless Epilepsy Detector (SmartCED): an Android monitoring application able to diagnose neonatal clonic seizures and warn about their possible occurrences in realtime. SmartCED has, however, wider applicability so that it could also be used on adult patients. The main goal is to implement a wire-free and low-cost epilepsy diagnostic system, executing...
SystemC is the de facto standard system-modeling language for hardware-software systems. A concurrent and reactive hardware-software system performs different “jobs” during its execution. Each such job begins with a set of input data, flows through different processes in the system, and finally produces a set of output data. We call such a job a flow, since it flows from one process to another. Flows...
Worldwide a large number of Future Internet and Smart City infrastructures exist. To provide a global view on these infrastructures in Europe, the Infinity Project has developed an on-line catalog called the XiPi portal. Its main objective is to facilitate the construction of a sustainable market for infrastructure providers to advertise their capabilities and capacities for end-users. In this context,...
This paper presents the findings of a literature review that explored the impact of assistive technologies (AT) on quality of life (QOL) for people with dementia. Of the 799 identified papers only 18 studies met the eligibility criteria. The review concludes that few empirical studies involve people with dementia using AT. There is a clear indication that people with mild to moderate dementia are...
In recent years, many C code static analyzers, with different abilities of bug detection, have appeared and been applied in various domains. There are so many choices that it becomes hard for programmers to know in detail the strengths as well as limitations of all these analyzers and to find the most suitable ones for their code. In this paper, we propose a benchmark for C code static analyzers,...
SaaS (Software as a Service) has been widely recognized as a new kind of service. Meanwhile, PaaS (Platform as a Service) is emerging in recent years. The management of service on PaaS platform is quite different from that of traditional services. This paper analyzed the service management activities of PaaS and proposed an intuitive and easy approach to the service management activities such as deploying,...
This paper mainly introduces the cyber infrastructure and e-Science application practices of Chinese Academy of Sciences. We present current situation of the cyber infrastructure from research network infrastructure, high performance computing environment, scientific data infrastructure, collaboration environment and digital library. We briefly introduce e-Science application demonstrations supported...
SQL injection attacks, a class of injection flaw in which specially crafted input strings leads to illegal queries to databases, are one of the topmost threats to web applications. A number of research prototypes and commercial products that maintain the queries structure in web applications have been developed. But these techniques either fail to address the full scope of the problem or have limitations...
Software experiments such as BLAST are hard to reproduce even if identical hardware is available because external data sets could have changed, software used in the original experiment may be unavailable, or the input parameters for the experiment may not be documented. This paper presents Rex, a toolset that allows one to record an experiment and archive its apparatus, replay an experiment, conduct...
This paper applied Multi-Agent to E-commerce personalized Recommender System, and designed E-commerce personalized Recommender System based on Multi-Agent, namely, MAPRS. Off-line recommendation and on-line hybrid recommendation are used to construct the core recommender model under the intelligent control. The paper presents the function and design ideas of various components of the system.
It is great harm to physical and mental health of young people addicted to online games for long-term. This paper proposed an fatigue system for online game, which uses online game fingerprint database, hook API and other technical means, and determines and filters games' process in the device drive level. This system provides a simple but powerful online games firewall.
Exception handling in workflow management systems (WFMSs) is a very important problem since it is not possible to specify all possible outcomes and alternatives. To ensure a high service quality in such Procurement and Inventory Management System based on workflow, exception-handling schemes for conflict resolution are needed. In this paper, a based on Agent workflow exception handing model and mechanisms...
SQL injection attack (SQLIA) is a prevalent method which makes it possible for the attackers to gain direct access to the database and culminates in extracting sensitive information from the firm's database. In this survey, we have presented and analyzed six different SQL Injection prevention techniques which can be used for securing the data storage over the Internet. The survey starts by presenting...
Many network management stations are designed statically to accomplish a set of defined functions taken from object IDs. As the implemented MIB objects for under-development WiMAX tend to grow, redesigning a deployed network manager would occur many times. Therefore, providing a more generalized and customizable network manager would become an alternative solution. In this paper, we design a customizable...
The Royal Netherlands Air Force (RNLAF) operates several weapon systems, such as Chinook and Apache helicopters, F-16 fighters and C-130 Hercules transport aircrafts. For these weapon systems the Dutch National Aerospace Laboratory NLR performs several loads and usage monitoring programs. For these programs masses of flight and administrative data are collected and stored in multiple, heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.