The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Text data is defined as sequences of characters that may become big data that has no specific format and only can be processed using the original Hadoop. Amazon Web Services AWS provides virtual Cloud Computing services such as storing data using S3 service and processing big data using EMR service. Amazon Elastic MapReduce EMR uses the original Hadoop as a processing environment to its Cloud Computing...
This paper describes the design and implementation of a tool to extract the IMDb dataset files and import them into a database. This approach differs from other published tools or research in that the previous work used relational databases. This tool uses document oriented data structures, and allows others to augment the code to change structures based on their needs. The project development required...
Quantum key distribution (QKD) is the future of the cryptography world. The QKD was invented to increase the security rate when exchanging a private key. Since 1984, several experimental attempts to design protocols have been developed based upon the rule of physics. These QKD protocols were represented by different algorithms with limited ability to stand up against quantum attacks. This paper evaluates...
Digital image processing, i.e. the use of computer systems to process pictures, has applications in many fields, including of medicine, space exploration, geology and oceanography and continues to increase in its applicability. The main objective of this paper is to demonstrate the ability of image processing algorithms on a small computing platform. Specifically we created a road sign recognition...
Wireless sensor networks (WSNs) are susceptible to most security attacks. There are some limitations such as reliability, energy efficiency, and scalability, which affect sensor nodes. These limitations mostly affect the security of wireless networks. Also, limited capacity of sensor nodes accounts for the security attacks on WSNs. Applications such as military surveillance, traffic surveillance,...
Wireless Cloud computing delivers the data and computing resources through the internet, on a pay for usage basis. By using this, we can automatically update our software. We can use only the space required for the server, which reduces the carbon footprint. Task scheduling is the main problem in cloud computing which reduces the system performance. To improve system performance, there is need of...
In this paper, we mainly focus on the security of 802.15.4 MAC (Media Access Control) which used in Zigbee technology. Today, 802.15.4 Medium Access Control (MAC) is used in personal area networks, for example industrial automation, medical, home automation. However, encryption on MAC data payload have been introduced, but Medium Access Control (MAC) header is still non-encrypted. Authentication of...
In many wireless multimedia sensor networks (WMSNs) the nodes are static. However, node connection is subjected to change due to disruptions in wireless communication, power changes in transmission, or loss of synchronization between neighboring nodes. A sensor should constantly be aware of its immediate neighbors, through a process called continuous neighbor discovery. In this paper we introduce...
Today one cannot think of life without the Internet. The Internet has grown at a very fast pace, which has resulted in heavy Internet traffic. Most of today's internet traffic is due to video streaming services such as YouTube and Netflix. The Average traffic load has risen, and data traffic patterns have also become unpredictable. Therefore, network traffic monitoring and analysis have become essential...
Cloud computing refers to the services supplied over the internet and the hardware and software that delivers such services. It has the capability to cover a large part of the IT industry and make software even more appealing as a service. It can also reshape how IT hardware is designed and acquired. Nevertheless, datacenters that offer cloud applications consumes a large amount of power which can...
In the concept of network layers, a failure at one layer can cause failures in preceding layers of the network architecture. With that in mind, it is very likely that the methods to handle such problems in traditional networks may not work as effectively in Multilayer Networks. The focus of this team is to maximize the connectivity of Wavelength Division Multiplexing layered networks as efficiently...
Over the past two decades Wireless Sensor Networks (WSNs) and their applications have been the topic of many studies. WSN is a network responsible for collecting, processing and distributing wireless data to the intended database storage center. Because these sensors are usually installed at remote sites, despite the recent advances in the WSN technology, its applications still face significant challenges...
Deep Convolutional Neural networks (ConvNets) have achieved impressive results in several applications of computer vision and speech processing. With the availability of a large training set, it is common to find that the set contains useless samples (instances), either redundant or noisy. The process of removing these instances is called instance selection in the machine learning field. This paper...
Authentication is one of the security services that ensures sufficient security of the system by identification and verification. Also, it assures the identity of the communicating party to be that the claimed one. To build a quantum channel between two unauthenticated to each other parties, first, a trusted authority is needed to establish a mutual authentication with each party. Using Bell measurement...
Over the last 15 years the world as seen a surge in users owning smartphones and electronic devices. People today have smartphones that have the computational capabilities of computers from more than 45 years ago. With the growing populous under this information age, individuals have access to so much data. It is a fantastic time to spread ideas as anyone can reach anybody else over the internet almost...
Wireless sensor networks are one of the fast growing technologies in communication field, because of their compact size and ability to work in rugged conditions where human reach is not possible. This paper discusses about H-LEACH, which is used to solve problems of energy considerations while electing a channel head. H-LEACH considers residual and maximum energy of nodes for every round while electing...
Glaucoma is a disease that destroys the optic nerve of the eye. As a result, it causes vision loss or blindness. However, with immediate diagnosis and treatment, eyes can be protected against severe vision loss. Most vision loss cases due to Glaucoma are preventable if the disease is treated in the early stages. Most Glaucoma cases happen without signs and symptoms because peripheral vision can be...
The usage of fingerprints is no longer limited to crime investigation. And automated fingerprint identification systems have been developed for a variety of applications. However, in law enforcement agency manual categorization and analysis are still an indispensible part of fingerprint operation mainly for the following two reasons: (1) Automated fingerprint classification and identification systems...
Traceroute is widely used, from the diagnosis of network problems to the assemblage of internet maps. However, there are a few serious problems with this tool, in particular due to the presence of load balancing routers in the network[1]. We provide a new publicly-available traceroute, called Paris traceroute, which controls packet header contents to obtain a more precise picture of the actual routes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.