The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart or intelligent farming is a relatively new concept, but it's becoming an important factor for the agricultural sectors, as a way to raise productivity through technology. This article presents a global management and decision system for smart farming. Our system is addressed to farmers and other actors involved in farming operations, such as rural service companies and banks. It can manage up...
Data protection and information security have always been intricate problems of the majority of software applications which have been deployed throughout the Internet. Consequently, a substantial effort has been put into the creation and development of a wide variety of solutions to tackle this very issue. The aim of this paper is to offer a means of performance measurement and security validation...
Nowadays the applications for real time processing of large amounts of data are encountered increasingly more frequently, as there are lots of system's types that can generate large comprehensive information in a relatively short time. In this paper we focus on sensor-based systems. Such systems may be found in several important domains, such as smart farming, medical field, water management, or smart...
Forecasting has always been of interest. Whether one's field is finance, health or seismology, being able to predict future values based on previously gathered data proves to be invaluable when taking decisions concerning the future. In this paper, we research machine learning techniques for predictions on time series and choose the best models that fit our use case, Smart Farms, in which we distributedly...
Smart or intelligent farming is a relatively new concept, but it's becoming an important factor for the agricultural sectors, as a way to raise productivity through technology. This article presents a global management and decision system for smart farming. Our system is addressed to farmers and other actors involved in farming operations, such as rural service companies and banks. It can manage up...
Service Oriented Architectures offer modularity and flexibility, while maintaining a relatively simple communication model. Security is still needed as messages can be intercepted by a potential attacker and the service interaction can be compromised. One research direction to achieve this is to hide the identity of the communication parties by assuring sender and receiver anonymity and by protecting...
Cloud computing has developed into an ubiquitous distributed system model, offering services which range from storage to computing power or database infrastructure. The security aspect of such distributed systems is a very important and challenging issue. In this paper we propose a security solution which offers policy enforcement in order to detect denial of service attacks and to manage quota parameters...
Multimedia services are advanced applications with large data sets, high computational resources prerequisites and distributed execution flows. The fairly new domain of cloud computing proposes a model of virtual resources management that fulfills the requirements of an efficient development and deployment environment for this type of services. Throughout this paper we present the design of a multimedia,...
Failure management is a key component in the attempt to provide a reliable environment. This article proposes a solution to increase the reliability of distributed systems based on the Chord Peer-to-Peer overlay. our solution is aimed at providing accurate failure information about the nodes in the system. This is a very difficult task in Peer-to-peer networks due to their dynamic nature and the inability...
Cloud Systems provide computing resources in a flexible manner. There are several key requirements that need to be addressed regarding the resource allocation in Clouds and the most important of them is providing on demand elasticity. This paper focuses on adding new features to the Cloud resource allocation mechanism that enhance on demand elasticity. Most of the resource managers that are now on...
Spam messages are becoming a serious problem for most system administrators and computer users. Along with the increase in spam volume there is also a need for efficient detection methods which are able to cope with the analysis of thousands of emails per day. In this article we present a novel solution for spam detection which is based on a service oriented architecture, able to scan and classify...
In this paper we present a novel Intrusion Detection System which uses a hybrid approach based on a pattern matching engine and a neural network functioning in parallel to improve the detection efficiency. The attacks that this module is able to detect will be presented, as well as the methods used. This approach is based on the Netpy traffic monitoring and analysis tool which we developed. To test...
The main purpose of network intrusion detection systems is to determine whether incoming network traffic matches known attack signatures. To achieve this goal each of the stored signatures represents a description of an attack or an undesired event in the monitored network. The main weakness with existing signature matching algorithms is that they are essentially serial operations and it is hard for...
Providing an adequate security level in Cloud Environments is currently an extremely active research area. More specifically, malicious behaviors targeting large-scale Cloud data repositories (e.g. Denial of Service attacks) may drastically degrade the overall performance of such systems and cannot be detected by typical authentication mechanisms. In this paper we propose a generic security management...
The need for reliability in Grid Systems is a difficult challenge which is very important in the context of highly dynamic systems composed of thousands of nodes. Failure management is a key component in the attempt to provide such a reliable environment. The proposed approach is based on the existence of accurate failure information about the nodes in the Grid which is very difficult in large scale...
The goal of this paper is to develop a fault tolerant Grid Intrusion Detection System. The architecture is based on a network of high level detection systems which receive intrusion information form local detectors. These high level detectors constantly exchange information using gossip algorithms and correlate the data received received from the local level to detect complex attacks targeted at different...
This paper presents a novel intrusion detection system for Grid Systems. It is intended to identify potential attackers who try to modify or compromise the applications sent to execution by various users or target different resource groups within the Grid. The system makes use of a number of available local intrusion detection systems which send data to a grid-level intrusion detection system that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.