The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Existing Big data analytics platforms, such as Hadoop, lack support for user activity monitoring. Several diagnostic tools such as Ganglia, Ambari, and Cloudera Manager are available to monitor health of a cluster, however, they do not provide algorithms to detect security threats or perform user activity monitoring. Hence, there is a need to develop a scalable system that can detect malicious user...
Logs are one of the most important pieces in forensics, which can be leveraged to extract critical evidences or help drastically speed up the investigation. Nevertheless, collecting the logs from cloud infrastructure is extremely difficult, since the investigators almost totally lack of control over the cloud. In this work, we introduce the notion of secure logging monitor service, which is deployed...
Forwarding messages in opportunistic networks incurs costs for nodes in terms of storage and energy. Some nodes becomes selfish or even malicious. The selfish and malicious behaviors depress the connectivity of opportunistic networks. To tackle this issue, in this paper, we propose CARISON: a community and reputation based incentive scheme for opportunistic networks. CARISON allows every node belongs...
This paper proposes a mobile smart health service platform - Fihuo based on the analysis of big data. Fihuo can present the long-term health-related data and ambient data to users, which are collected through wearable devices, smartphone applications and background big data processing mechanism. Fihuo can analyze and compare the health-related data, moreover provide the on-line browsing and monitoring...
With the development of the network, internet security is becoming a hot research topic. The vulnerabilities existed in protocol implementations may be exploited by malicious attackers and cause serious problems. So it is necessary to do research in the vulnerability mining of network protocol. This paper presents an efficient approach for detecting the flaws of network protocols based on fuzzing...
Message-oriented middleware especially for message queue has been widely used in web applications and services. Performance and scalability are quite essential in these systems however they often become the bottleneck. Existing message queues are not able to scale out elastically very well. This paper presents a decentralized distributed architecture based on peer to peer model, in which we always...
A mobile ad hoc network (MANET) is a self-configuring network of mobile nodes connected by wireless links without fixed infrastructure, which is originally designed for a cooperative environment. However, MANETs are subjected to a variety of attacks by malicious nodes, in particular for attacks on the packet routing. Compared with traditional cryptosystem based security mechanisms, trust-enhanced...
With the development of IoT technologies, more and more medial sensors have been used to monitor people's health. In this paper, we design a kind of semantic medical monitoring system model in the cloud based on the IoT sensors. Lots of IoT sensors will accept the massive sensor data every time. All these massive sensor data will be stored in the HDFS and some information will be stored into the HUADING-S,...
A scheme is put forward in this paper of master-slave PLC control network based on distributive control model for fulfilling the vast control scope and adapting to the sordid conditions in coal mine signaling centralized and locking system. The implementation of controlling hardware is well discussed. The software is analyzed as well, primarily consisting of supervision program and communication programs...
Trend of accelerated aging society increases need of care for the aged at home. To fit this need, we designed the continuous body posture monitoring system based on wireless sensor networks. The hardware platform is made up of anchor nodes, the central control node and wireless sensor nodes which include the three axis low-g accelerometer MMA7260, 2-axis magnetic sensor HMC5883L and CC2431 System-on-Chip...
Based on the precipitation monitoring data of Xiangtan from 2004 to 2008 and from 1993 to 1998, the article mainly analyzed the characteristics, regularity and development tendency of acid rain in Xiangtan. And then, some advices are taken according to the status and characteristics of acid rain of Xiangtan.
A web-based management system for urban road lighting is developed for the purpose of energy-saving. Following the trends of energy-saving and emission reduction, energy-saving lamps are widely used as measures taken by related organizations, including previous loop control systems and current single-lamp control systems. Our system consists of a platform of remote monitoring and management of street...
This paper presents a new method for odor source localization using a Wireless Sensor Network (WSN) by means of collaboration with a mobile robot. The method has two steps: an initial estimation of the position of odor-source is obtained centrally by one robot and is based on particle filtering. It does not require any prior information about the position of the nodes. In the second stage, the nodes...
Middleware has been the most popular runtime platform of modern IT systems and widely adopted in a number of major application domains. Middleware not only provides infrastructural services supporting applications, but also plays an important role in system management. Due to the ever-changing user requirements and application contexts along with the diverse usage patterns, only an individual middleware...
The airfield lighting system is very important for airplanes to land and take off safely. It is especially important for night flights. However the environments for the airfield lighting are usually rough and wide, posing great difficulties to inspection and maintaining. For these reasons a airfield lighting monitoring system is urgently required. It could detect the failure position quickly and accurately...
Fuzzy information fusion methods are adopted widely to resolve the complicated nonlinear problems in recent years. This paper proposes a fusion learning algorithm of radial basis function (RBF) neural network based on fuzzy evolution Kalman filtering. By using this proposed method, monitoring data are extracted and optimized in mine safety monitoring, and Matlab simulation results are analyzed. The...
Following the economy of our country rapidly develops in recent years, more and more people possess vehicles of their own, and the number of urban vehicle is increasing fast as well. All of these directly challenge the management of urban traffic and normalization of driving behavior. According to actual request for urban traffic, Vehicle Supervision System Based on MEMS Geomagnetic Sensor, for short...
According to the importance of establishing contingent event management system, the main objective of this paper is to construct a coordinating system framework of third party logistics supplier (3PLS). Firstly, we analyzed different kinds of contingent events and the importance of dealing with emergency management. Secondly, we introduce Unified Modeling Language in general, and then we propose the...
Real-time risk assessment, forecasting risk trend and dynamic risk management are main contents of the real-time risk management. It is a new research field of information security technology. This paper proposes a novel approach to real-time risk management framework. The framework consists of real-time risk assessment, risk prediction and dynamic risk management. The real-time risk assessment module...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.