The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses...
A card-based protocol enables parties to securely compute a desired function by using physical cards instead of computer devices. Most of the previous works have aimed to achieve protocols with a smaller number of cards for elementary functions (e.g., AND/XOR/COPY). Mizuki and Shizuya's protocols achieve the smallest numbers of cards among the existing protocols. Their XOR and COPY protocols can be...
To satisfy more and more complicated requirements on information recording, processing, exchange etc. in newly developed intelligent satellites, a distributed storage system is designed based on SpaceWire network in satellite platform. In this distributed storage system, a SpaceWire router unit serving as the core device of star network connects several nodes, including onboard computers, namely,...
There are several standardized protocols based on SpaceWire which provide data exchange between several nodes. SpaceWire is also suitable for interprocess communication (IPC), by the help of higher level protocols. However, currently there is no standardized protocol which is targeting IPC on SpaceWire networks. This paper proposes a protocol, which uses the capabilities of SpaceWire to build up networks...
Social presence has two opposing effects on human corruption: the collaborative and contagious nature of another person's presence can cause people to behave in a more corrupt manner. In contrast, the monitoring nature of another person's presence can decrease corruption. We hypothesize that a robot's presence can provide the best of both worlds: Decreasing corruption by providing a monitoring presence,...
This paper highlights different security threats and vulnerabilities that is being challenged in smart-grid utilizing Distributed Network Protocol (DNP3) as a real time communication protocol. Experimentally, we will demonstrate two scenarios of attacks, unsolicited message attack and data set injection. The experiments were run on a computer virtual environment and then simulated in DETER testbed...
The main goal of this paper is to present a simple and inexpensive software solution for remote management of PTZ camera systems EVI-D70CP. Performed analysis demonstrates the technological solution for control of multiple cameras within lecture room or laboratory. Paper deals with the differences in the various serial communication methods, various functionalities of camera systems, followed by a...
Information technology (IT) plays a vital role in healthcare administration and management. IT facilitates doctors, nurses or physicians to improve the speed and performance of the medical system as a whole. This results in accumulation of healthcare data since various types of software which generate their own data types have been widely used. Since different software were used in different medical...
As billions of devices connect to the Internet, a new Web of Things is emerging, with virtual representations of physical or abstract realities increasingly accessible via Web technologies. Achieving a new phase of exponential growth, comparable to the earliest days of the Web, will require open markets, open standards, and the vision to imagine the potential for this expanding WoT.
Cardinality estimation of underwater network is somewhat troublesome using terrestrial node estimation methods due to unique characteristics of underwater environment such as large propagation latency, node mobility, non-negligible capture effect, and high error rate. For this reason, a cardinality estimation method based on cross-correlation of Gaussian signals is proposed for underwater network,...
Increasing demand on data center and computer labs in Indonesia affected by the increasing number of users who use the computer for business or education. One of the main requirements that can not be separated from the use of a computer is a storage area in the form of a USB Flash Disk, External HD, HD to Internal HD for the need for a large-scale computer servers located in the data center, laboratory...
Neuropsychological assessment is a key issue to obtain a prior dementia diagnosis and is traditionally supported by standard neuropsychological test batteries (NPS). In daily practise, clinicians administer a high number of NPS tests, however, the supervision of such tests and posterior assessment is not a simple issue. After two decades, computer-based NPS batteries have received considerable attention...
Documents such as the Geneva (1949) and Hague Conventions (1899 and 1907) that have clearly outlined the rules of engagement for warfare find themselves challenged by the presence of a new arena: cyber. Considering the potential nature of these offenses, operations taking place in the realm of cyber cannot simply be generalized as “cyber-warfare,” as they may also be acts of cyber-espionage, cyber-terrorism,...
Computer and network systems are consistently exposed to security threats, making their management even more complex. The management of known vulnerabilities plays a crucial role for ensuring their safe configurations and preventing security attacks. However, this activity should not generate new vulnerable states. In this paper we present a novel approach for autonomously assessing and remediating...
Smartphones and tablets are now part of our everyday lives, facilitating access to information through intuitive graphical interfaces. They can make great devices to work with robots [1] because they integrate a lot of sensors and reasonable computing power. Using ROS [2] on those devices would facilitate code reuse and integration with existing robotics applications and libraries.
Nowadays, RFID systems have been widely deployed for applications such as supply chain management and inventory control. One of their most essential operations is to swiftly identify individual tags to distinguish their associated objects. Most existing solutions identify tags sequentially in the temporal dimension to avoid signal collisions, whose performance degrades significantly as the system...
If everything had gone according to plan, the Internet as we know it would never have sprung up. That plan, devised 35 years ago, instead would have created a comprehensive set of standards for computer networks called Open Systems Interconnection, or OSI. Its architects were a dedicated group of computer industry representatives in the United Kingdom, France, and the United States who envisioned...
Nowadays, computer systems are presented in almost all types of human activity and they support any kind of industry as well. Most of these systems are distributed where the communication between nodes is based on computer networks of any kind. Connectivity between system components is the key issue when designing distributed systems, especially systems of industrial informatics. The industrial area...
With a quick glance through this paper the reader will question if it is being presented at the correct conference. The paper is full of IT jargon and networking concepts that would likely be more at home in an IT conference. That is exactly the point of the paper. Plant Control Systems are being tasked with handling increasing amounts of information from intelligent devices and subsystems in the...
This paper compares twelve libraries of object serialization from qualitative and quantitative aspects. Those are object serialization in XML, JSON and binary formats. Using each library, a common example is serialized to a file. The size of the serialized file and the processing time are measured during the execution to compare all object serialization libraries. Some libraries show the performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.