The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cheetah flows, which are high-rate flows, can cause increased packet delays and losses in other flows. Leveraging the flexibility offered by the NFV paradigm, our proposed Cheetah Flow Identification Network Function (CFINF) uses a novel method in which a new measure, short-duration flight rate, which is the rate of a flight of packets received over a fixed (short) time interval, is computed and compared...
We present an approach to tracking the behaviour of an attacker on a decoy system, where the decoy communicates with the real system only through low energy bluetooth. The result is a low-cost solution that does not interrupt the live system, while limiting potential damage. The attacker has no way to detect that they are being monitored, while their actions are being logged for further investigation...
This paper identifies that the anycast communication pattern is needed in the Machine Type Communications (MTC), where there could be multiple MTC devices being deployed in the same area for the same type of data, the client only cares about the data being retrieved but not where the data comes from. Currently the MTC server can provide such anycast service, but with large signaling overhead and bandwidth...
The increasing demand for smarter yet more efficient indoor spaces necessitates moving towards advanced technologies, such as Internet of Things architectures, to allow further integration to our physical world. In this work, we introduce a Bluetooth Low Energy-based infrastructure for location-aware buildings, along with a full-scale real-subject trial. The trial was undertaken with students in our...
Building on the adoption of the Network Functions Virtualization (NFV) and Software Defined Networking (SDN) paradigms, 5G networks promise distinctive features including the capability to support multi-tenancy. Virtual Network Operators (VNOs) are expected to co-exist over the shared infrastructure, realizing their network functionality on top of virtualized resources. In this context, we observe...
Participatory sensing is an emerging paradigm in which citizens voluntarily use their mobile phones to capture and share sensed data from their surrounding environment in order to monitor and analyze some phenomena. Participating users can disrupt the system by contributing corrupted, fabricated, or erroneous data. Different reputation systems have been proposed to monitor participants' behavior and...
In order to realize the function of accurate measurement, multipoint collection and wireless transmission on various environmental monitoring factors in the workshop, a workshop environment monitoring system is proposed based on the technology of internet of things. A number of wireless monitoring nodes are set up in each workshop to collect a variety of environmental information, then transmit the...
For purpose of information management of film capacitor production workshop to provide convenience for production department management to grasp the production realtime data, in this paper, we design a film capacitor production monitoring system adopting the man-machine interactive information collection technology based on data acquisition and wireless network transmission. By the technology, we...
A system for monitoring the moisture level and temperature of an adult disposable brief has been designed and tested. The system uses an inexpensive (< $0.05) disposable moisture sensor combined with a re-usable temperature sensor and a Bluetooth Low-Energy transceiver module costing less than $15. The battery lifetime using the CR2032 coin cell is greater than 3 years while sampling data at 10s...
Active exploitation of the previously proposed Set Top Box testing framework has given rise to new requirements such as remote monitoring of test execution. The system described in this paper is web-based and receives periodic updates of each registered test station, thus being a real-time web application. The system displays the video output of each tested device as an MJPEG stream. The large number...
Today activity trackers are used as a major tool for tracking, monitoring, and quantifying health aspects in the form of physiological data. Such wearable trackers can be efficiently utilised in other fields apart from healthcare. This paper shows how an activity tracker can be used to create a real time application for monitoring the activity of a student by parents as well as school/college authority...
The level of trust accorded to certification authorities has been decreasing over the last few years as several cases of misbehavior and compromise have been observed. Log-based approaches, such as Certificate Transparency, ensure that fraudulent TLS certificates become publicly visible. However, a key element that log-based approaches still lack is a way for clients to verify that the log behaves...
Network is the direction of development for industrial control, application of PROFIBUS-DP network consisting of S7-300 PLC S7-200 PLC produced by Siemens is becoming more and more widely. WinCC is powerful PC monitoring configuration software, often need to read and write datum of master-slave PLC in the network. This paper discusses the method of direct communication between WinCC and master-slave...
There are proven benefits in terms of cost and convenience in delivering thin-client based virtual desktops, versus the use of traditional physical computers for end-user computing purposes. In this paper, we present novel extensions in terms of user interface and methodology to our previously developed VDBench benchmarking toolkit for virtual desktop environments that uses principles of slow-motion...
In this paper, we propose a novel SSD caching scheme and virtual disk image format, named SVD (Sequential Virtual Disk). Our proposed techniques are based on workload characteristics in home cloud server, in which synchronous random writes dominate. Unlike previous studies, we use SSD as a read-write cache in order to effectively mitigate performance degradation of synchronous random writes.
Complex Event Processing (CEP) is a set of tools and techniques that can be used to obtain insights from high-volume, high-velocity continuous streams of events. CEP-based systems have been adopted in many situations that require prompt establishment of system diagnostics and execution of reaction plans, such as in monitoring of complex systems. This article describes the Query Analyzer and Manager...
The SmartCity concept is becoming widely accepted and describes the usage of ICT for increased quality of life and also for a sustainable usage of natural resources. This paper describes a system architecture for monitoring of electrical energy consumption, and visualization of usage patterns to raise users' awareness of their energy usage which we field trialled over several months. The information...
Natural scientists use large scale sensor networks for gathering and analyzing environmental data. However, the implementation work requires expert programmers. The problem is complicated by limited battery lifetime, processing power and memory capacity of the nodes, because this requires a low-level programming language. Since scientists are used to analyzing data with spreadsheets, researchers have...
Large-scale centralized network management, such as that of cloud computing, software-defined networking (SDN), and network virtualization is becoming increasingly popular. Thus appropriate interface devices are required in which new devices are incorporated together with legacy devices to facilitate large-scale network management. To accommodate the existing communication devices, which are not expected...
As the bandwidth of Internet rises from ISPs, the proportion of different Internet traffic and underling services have changed. There is about 20% decrease of the P2P traffic compared to an increase of more than 10% of the traffic of cyberlockers services, which are websites providing direct file download functionalities. In this paper we present a recent study over three cyberlockers: Rapidgator,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.