The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This research provides a concise answer to how to organize a strong infrastructure of information technologies for high availability based on open source software, it's necessary for large organizations to provide high availability, the work will focus on explaining the procedures to provide services for users 24 hours the 365 days. Centralization is a major weakness today because is the only source...
Visualization became one of the solutions in showing the attack on the network. With Visualize the attack, it would be easier in recognizing and conclude the pattern from the complex image visual. The target of DoS attacks can be addressed to the various parts of the network, it can be routing, web, electronic mail or DNS servers (Domain Name System). The purpose of the DoS attacks create a server...
The accuracy of user location information is inversely proportional to the user's privacy preserving degree k, and is proportional to quality of query service. In order to balance the conflict between privacy preserving security and query quality caused by the accuracy of location information, A clustering algorithm aiming at eliminating outliers based on k-anonymity location privacy preserving model...
In a group touring scenario, the group leader can enable his handheld device's Wi Fi hot spot function to let other members to connect with. Then, the group leader can download Point Of Interests' (POIs') data from the content server through 3G/3.5G/4G cellular network and then forward those downloaded data to the connected clients using Wi Fi. That is, the group leader also plays the role of a mobile...
Privacy preserving data mining have been studied widely on static data. Static algorithms are not suitable for streaming data. This imposes the study of new algorithms for privacy preserving that cope with data streams characteristics. Recently, effective anonymization algorithms have been studied on centralized data streams. In this paper we propose an approach for anonymizing distributed data streams...
The Internet is a medium for people to communicate with each other. Individuals and/or organizations are faced with increased security threats on the Internet. Many organizations prioritize on handling external security threats over internal security threats and for this reason, internal security threats are often missed or worst ignored. Domain Name System (DNS) is one of major Internet services...
One of primary and challenging difficulties in placing virtual machine (VM) onto physical machines in a cloud data center, is to balance the interests of both cloud service providers (CSPs) and cloud tenants, which are often expressed as minimizing the number of power-on servers and improving user experience respectively. However, the current research on VMP try to gathering the requested VMs on the...
We consider the problem of accurately and efficiently querying a remote server to retrieve information about images captured by a mobile device. In addition to reduced transmission overhead and computational complexity, the retrieval protocol should be robust to variations in the image acquisition process, such as translation, rotation, scaling, and sensor-related differences. We propose to extract...
Wireless Sensor Networks (WSNs) consist of densely distributed sensor nodes with embedded low computational power CPU, limited storage and low power radios. WSNs are widely used to monitor environmental conditions, such as temperature, sound, and vibration and pressure, in disaster relief, home monitoring etc. Sensors need to provide precise timely information in military and health applications....
In order to perform optimal Virtual Machine (VM) consolidation under QoS constraints based on energy consumption in Cloud Data Centres (CDCs) containing heterogeneous physical resources, one must build a framework that combines many subsystem algorithms, including prediction, selection, placement, etc. Several energy minimization strategies can be used in CDCs, but the most importantly is one in which...
Mobile Cloud Computing is an emerging technology in today's digital era which enables mobile users to utilize the Cloud services. It enjoys the advantage of both Mobile and Cloud Computing but at the same time, it leaves out some of the pitfalls of both these computing technologies. In traditional Cloud computing, only the resources provided by the stationary Cloud were borrowed but the cooperation...
With the phenomenal increase in digital data, it is inefficient to run the traditional clustering algorithms on separate servers. To deal with this problem, researchers are migrating to distribute environment to implement the traditional clustering algorithms, more specifically K-means clustering. In traditional K Means Clustering, the problem of instability caused by the random initial centers exists...
This paper presents a design, implementation and evaluation of a web-based application called MergeXML (MXML). MXML was developed to integrate XML documents that are similar in terms of structure and content to complete information which can be used for information retrieval. XML documents are clustered into subtrees representing as instances using leaf-node parents as clustering points. The system...
Named entity sense disambiguation is a problem with important natural language processing applications. In the online recruitment industry, normalization and recognition of occupational skills play a key role in linking the right candidate with the right job. The disambiguation of multisense skills will help improve this normalization and recognition process. In this paper we discuss an automatic...
Vehicular Ad-hoc Networks (VANETs) which nowadays showed distinct researches around the globe. Advancements in wireless networks globally, which gave a new dimension to researchers. This paper reviewed the basic concepts of VANET and clustering. It presented various types of clustering which could be implemented for the efficient running of VANET. Using static clustering dividing geographical city...
In this fast life, everyone is in hurry to reach their destinations. In this case waiting for the buses is not reliable. People who rely on the public transport their major concern is to know the real time location of the bus for which they are waiting for and the time it will take to reach their bus stop. This information helps people in making better travelling decisions. This paper gives the major...
The problem of combining multi-modal features which extract from characteristics of given Cloud Computing Servers in the pattern recognition system is well known difficult. This paper addresses a novel efficient technique for normalizing sets of features which are highly multi-modal in nature, so as to allow them to be incorporated from a multi-dimensional feature distribution space. The intend system...
Recent advances on declarative paradigms have introduced expressive resources based on fuzzy logic. These are very useful for increasing the flexibility of the so-called fuzzy logic programming paradigm, resulting in highly expressive languages where the treatment of uncertainty and approximate reasoning is performed in a natural, efficient way. Therefore, making it extremely useful for decision-making...
Clustering of web users is an important research field in web mining. Information of web user clusters have been wildly used in many applications, such as solution of website structure optimization, reconstruction of website and distribution of advertising business. In this paper, we convert web log data into a sparse matrix, and propose a novel approach to calculate influence degree of each web page...
Cloud computing aims to provide enormous resources and services, parallel processing and reliable access for users on the networks. The flexible resources of clouds could be used by malicious actors to attack other infrastructures. Cloud can be used as a platform to perform these attacks, a virtual machine(VM) in the Cloud can play the role of a malicious VM belonging to a Botnet and sends a heavy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.