The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network security has become a major concern in recent years. In this research, we present an entropy-based network traffic profiling scheme for detecting security attacks. The proposed scheme consists of two stages. The purpose of the first stage is to systematically construct the probability distribution of relative uncertainty for normal network traffic behavior. In the second stage, we use the...
Internet is an integral part of modern life. Users often visit many different websites regularly in the course of their daily lives. As the number of websites that a typical user visits increases, so does the need to effectively manage these sites should the user want to re-visit them later. Most users simply rely on the bookmarking or favourite features of the browser they use to manage these sites...
Wireless sensor networks have become very useful in so many applications. Applications such as grape monitoring, insect movement monitoring and etc., that allows connectivity between sensor network and Internet can solve many remote control and monitoring problems. IPv6 over low power WPAN (6lowPAN) protocols are suitable technology that can be adapted in wireless sensor network. The deployment of...
Plagiarism is the practice of claiming, or implying, original authorship or incorporating material from someone else's written or creative work, in whole or in part, into one's own without adequate acknowledgement. Unlike cases of forgery, in which the authenticity of the writing, document, or some other kind of object, itself is in question, plagiarism is concerned with the issue of false attribution...
E-mail systems are some of the most admired Internet-based applications today. They enable users to send and receive e-mail messages between each other both from inside and outside the local area network. The simple mail transfer protocol (SMTP) is a transportation protocol used to transfer Email messages over the Internet. When the e-mail server sends email messages among each other or from the clients...
An organization undertakes various steps to make sure that their business runs smoothly without any difficulties. Among them, data protection procedure is the soul of an organisation to recover from a disaster. This minor research aims at proposing a new risk analysis method which facilitates in overcoming issues related to data protection.
As the Internet is rapidly growing and its popularity increases, users tend to use creative, time-conservative, entertained and economical technologies. Real-time applications such as online gaming, voice and video applications are becoming more popular. Research effort to improve scheduling mechanisms in routers is currently given less attention by network researchers. This trend is far behind in...
Signature verification is the process used to recognize an individual's handwritten signature to prevent fraud. In this paper pressure at the pen-tip together with the x, and y coordinates of the signature are measured and features extracted from these are used to verify the signature. A pressure pad was used to obtain signature samples. A signature verification system using SOM neural network was...
The creation of efficient and secure framework is becoming important with the rapid development of internet and World Wide Web (WWW). The objective of this paper is to examine the web based framework to retain the information of any organization. Thus, we propose a new scaffold on the basis of JSP Access Model and Model-View-Controller (MVC), which will assist in providing information regarding users...
Product inventory and location management systems using IDs in RFID tags are now commercially introduced. However, systems that require highly precise product locations need to use multiple tag sensors. This requirement increases the system cost. These systems also require a database system for ID-based management. This paper proposes a location management method that requires only a single tag sensor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.