The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing has emerged in recent years as a popular method of deploying information technology (IT) solutions within organisations. Cloud computing provides scalable, on-demand IT resources, which can be rapidly provisioned and utilised over the Internet. Cloud computing solutions can provide an excellent alternative for educational institutions where budget cuts have been incurred and cloud...
Distributed computing is a new paradigm in the field of resource sharing. Distributed computing seems as more promising in terms of request failure, security, flexibility and resource availability. It's main feature is to maintain the Quality of Service (QoS) provided to the end user in term of request processing power, request failure rate and many more. So resource management is important and maintaining...
K-modes is a typical categorical clustering algorithm. Firstly, we improve the process of K-modes: when allocating categorical objects to clusters, the number of each attribute item in clusters is updated, so that the new modes of clusters can be computed after reading the whole dataset once. In order to make K-modes capable for large-scale categorical data, we then implement K-modes on Hadoop using...
Code-on-demand is an architectural style that a client dynamically downloads a raw script file and executes it on the client-side. This style causes a problem of network traffic because a raw script is not always compiled or minified in advance. Formatting rules, such as indents, line breaks and comments for ensuring human readability, are not necessary to the execution. In order to save wasteful...
Application processes have to be efficiently performed on servers in a cluster with respect to not only performance but also electric energy consumption. In this paper, we consider a process migration (MG) approach to energy-efficiently performing application processes on servers in a cluster. First, a client issues an application process to a server in a cluster. A process performed on a current...
Currently, mobile communications are provided convenient methods to explore and communicate with each other people. A multitude of services have converged on the smartphone platform, and potentially the most notable is social networking. Thus, the electronic Mobile Chat (MC) plays a very important role in the social networking. With the increasingly growing reliance on Mobile Chat System (MCS) in...
The Great East Japan Earthquake caused catastrophic damage to Iwate Prefecture, Miyagi Prefecture, and Fukushima Prefecture. A lot of relief supplies were sent to these stricken areas from all over the country in case of the Great East Japan Earthquake. However, since the relief supplies accumulation hub got confused by management and sorting work of relief supplies, "the relief supplies shortage...
In this paper, we present a method of acquiring / utilizing the study records using smartphone for improving the students learning motivation for learning. During the lecture, the students use the smartphone for learning. The results showed that the proposed study record system has a good effect for improving students' motivation for learning. For the professors of the university, it is difficult...
Virtual network is an important part of the cloud computing, Its management is achieved by the Quantum component of Open stack, which is one of the most popular cloud management platform. Currently, Quantum component has two deployment plans that is the single-host plan and the multi-host plan. Others' lab previously about the comparison of two deployment plans is incomplete and unsatisfactory. In...
Some authenticated data structures (ADS) can reduce authentication cost with using signature aggregation method, such as authenticated skip list, merkle hash tree etc. But these ADS cannot solve the complicated authenticated problems, such as relational query authentication. Pang et al present signature chain scheme aims at various types of relational query but has high cost. Therefore an improved...
One of the most challenging limitations for the elderly and/or the visually impaired people is the inability of self-navigation in unfamiliar indoor environments. Numerous existing indoor navigation systems have been proposed in order to solve such problems. However, these papers do not adequately examine the effectiveness of the systems in real time trials and are faced with a variety of technical...
Cloud-based outsourced storage alleviates the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. Nevertheless, the new conception does triggers lots of security issues. A major concern is how to ensure the integrity of the outsourced data. To deal with the problem, Chen et al. Recently proposed a remote data possession...
Session hijacking attacks of social network websites are one of the commonly experienced cyber threats in today's Internet especially with the unprecedented proliferation of wireless networks and mobile applications. To address this problem, we propose a cache supported hybrid two-dimensional one-way hash construction to handle social networks' user sessions authentication in collaborative applications...
Understanding the capabilities of adversaries (e.g., how much the adversary knows about a target) is important for building strong security defenses. Computing an adversary's knowledge about a target requires new modeling techniques and experimental methods. Our work describes a quantitative analysis technique for modeling an adversary's knowledge about private information at workplace. Our technical...
Cloud Infrastructure as a Service (IaaS), where traditional IT infrastructure resources such as compute, storage and networking are owned by a cloud service provider (CSP) and offered as on-demand virtual resources to customers (tenants), is the fastest maturing service model in cloud computing. The transformation of physical resources into virtual offers great flexibility to CSP customers including...
In wireless communication, the broadcast server serves numerous clients. The exchange of information from server and access by the clients takes place in a cyclic path using the directional antennas. But directional antennas have several drawbacks. So the multiple directional antennas were used to replace the fixed directional antenna systems. When using the multiple antennas to get the desired improved...
Since the phenomenon of cloud computing was proposed, there is an unceasing interest for research across the globe. Cloud computing has been seen as unitary of the technology that poses the next-generation computing revolution and rapidly becomes the hottest topic in the field of IT. This fast move towards Cloud computing has fuelled concerns on a fundamental point for the success of information systems,...
The research on Machine-to-Machine (M2M) using low-powered wireless devices has been emerging. Once low-powered wireless devices join into a network, they need to publish their own information and acquire a necessary information through discovery mechanisms. Then there are two kinds of discovery mechanisms - centralized approach and distributed approach. With CoAP (constrained application protocol)...
Easy and open development environments of Android make itself not only as the most famous platform in the world but also as the most preferred platform for malicious users. In this paper, we propose a new approach to protect the private phone number data in smartphones from leaking and stealing through malicious applications. Our approach differently deals with trusted and suspicious applications...
Distributed data stream processing has been gaining increasing research attention in recent years. Data continuity and massiveness has made it is critical and challenging to design a scalable and efficient dissemination system. Thus, a system that enables changes in database to copy or duplicate from one physical location or system to another (typically from a master to a slave system) is pertinent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.