The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-based systems are nowadays complex and highly distributed. In contrast, existing intrusion detection mechanisms are not always suitable for protecting these systems against new and sophisticated attacks that increasingly appear. In this paper, we present a new generic approach that combines monitoring and formal methods in order to ensure attack-tolerance at a high level of abstraction. Our...
This study focuses on supporting information systems security in the early phase of information systems development. Modeling languages have commonly been used by software developers during the designing of information systems. As an extension of Unified Modeling Language (UML) activity diagrams, Mal-Activity Diagrams (MAD) have also been used to model malicious and risk mitigation processes. Despite...
Internet of Things (IoT) is overturning traditional business models. IoT and Internet of Cars compose the internet of vehicles, which is creating driverless car times. Automotive aftermarket including maintenance, washing, car care, insurance and automobile finance, represents a whopping 60% of the overall auto market. Car wash is the most frequent one of all the service items, attracting internet...
The article describes computational experiment and further research work in the area of identification of destructive information influence in social networks. The problem of distribution of suicidal content via open sources is presented. On the basis of calculations there was made a conclusions about the prospects of using the methods of information retrieval in the task of identification of the...
Software Defined Networking (SDN) is an emerging paradigm that changes the way networks are managed by separating the control plane from data plane and making networks programmable. The separation brings about flexibility, automation, orchestration and offers savings in both capital and operational expenditure. Despite all the advantages offered by SDN it introduces new threats that did not exist...
Advances in computer science prompt the creation of new economic models. One of them in urban life is Sharing Economy. This new economic model receives high attentions and has been applied to a wide range of fields in recent years. We argue that sharing economy, and its applications, may be taken as a way for researchers to understand human behavior, and thus this paper targets a growing issue on...
The recent spread of mobile networks has paved the way for building a pervasive social networking (PSN) environment, which enables people to access social networking services (SNS) anytime and from anywhere. There have been extensive studies on MANET (Mobile Ad-hoc NETworks), which use mobile terminals for relaying information. While the feasibility of using them as emergency networks in the aftermath...
Hands-on ethical hacking and network defense has become an essential component in teaching cybersecurity. However, without understanding vulnerabilities in a computer system, it would be difficult to conduct successful network defense in order to prevent intruders in the real world. Therefore, teaching ethical hacking and vulnerability scanning is a key element to the success of cybersecurity curriculum...
Graph-based segmentation is gaining popularity among the many approaches in performing image segmentation, primarily due to its ability in reflecting global image properties. The most fundamental challenge in segmentation algorithm is to precisely define the volumetric extent of some object, which may be represented by the union of multiple regions. We developed a unified framework for volumetric...
We proposed an alternative method to use 3D depth sensors for tracking moving target instead of normal camera, and we developed a pattern recognition algorithm based on our real-time tracking results. In this paper we will present our algorithm and approaches, experimental results and verification.
We have introduced motion sensors into our researches of human motion capture in order to decrease the difficulty during anime production by free-hand. In this paper we will present an algorithm and approaches to simulate human gait with motion sensors. Some experimental results of verifications will be provided also.
With the emergence of smart grid which has bidirectional communication capability plays a key role in maintaining balance between demand and supply. The major portion of energy consumed by residential sector creates a huge deficit between generation and consumption. Home energy management (HEM) system incorporation scheduling algorithm is an efficient alternate to cover this deficit by appropriate...
Application processes like Web applications use not only CPU but also storages like HDD. In our previous studies, the algorithms to select a server in a cluster are proposed to energy efficiently perform processes which use either CPU or storages. In this paper, we consider a more general type of processes which do both the computation and access to storages. In this paper, we propose a computation...
It is critical to reduce the electric energy consumed in server clusters in order to realize eco society. In our previous studies, a server is selected to perform a process by estimating the termination time of every current process and then the electric energy consumption of servers. However, it is not easy and takes time to collect the state of each process and estimate the termination time of each...
This paper describes the verification plan on data hazard detection and handling for a 32-bit MIPS ISA (Microprocessor without Interlocked Pipeline Stages Instruction Set Architecture) compatible 5-stage pipeline processor, RISC32. Our work can be used as a reference for RISC32 processordevelopers to identify and resolve every possible data hazard that might arise during execution phase within the...
In an OpenFlow-based network, the resources arepartitioned in slices. For isolation reasons, each slice has its ownforwarding plane and therefore its own flow table. The searchmemory is so pre-partitioned between the slices. This pre-setmechanism for memory slicing would easily crash the controllerbecause of only one of the slices memory overload. To solvethis problem, we propose, in this paper, a...
We will focused the concept of serializability in order to ensure the correct processing of transactions. However, both serializability and relevant properties within transaction-based applications might be affected. Ensure transaction serialization in corrupt systems is one of the demands that can handle properly interrelated transactions, which prevents blocking situations that involve the inability...
Message ordering is one of the essential problems in distributed systems and applications. In spite of the importance, most of publish/subscribe systems do not guarantee the ordering of messages and events because of its cost which may give an impact on the overall performance. When we suppose dynamic systems, such as peer-to-peer systems, the implementation of the message ordering would be pretty...
The size of data chunk diverges from 101 to 1010 bits. Generally, if a network carries in a way both of big size data and small size data, the performance is extremely degraded by the big size data. Then, we propose to select a wireless cell among of multiple cells by referring context information such as data size and user's situation such as moving velocity. Especially, we show the improvement on...
Cloud Radio Access Network (Cloud RAN) is novel mobile network architecture. It uses cloud computing capabilities to enhance the quality of service (QoS) in next generation 5G networks. The basic concept of Cloud RAN is to separate the digital baseband processing units (BBUs) of conventional cell sites, from the Remote Radio Heads (RRHs), and move them to the cloud for centralized signal processing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.