Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In both wired and wireless networks, time synchronization is an important service for a wide range of applications in distributed systems. This includes radio interferometry. However, literature researches show that many distributed protocols cannot satisfy sub-ns time synchronization accuracy due to asymmetric delay errors, accumulated jitters and because of the strategy used to compute and adjust...
Botnet is a malicious software that can perform malicious activities, such as (Distributed Denial of Services) DDoS, spamming, phishing, key logging, click fraud, steal personal information and important data, etc. Botnets can replicate themselves without user consent. Several systems of botnet detection have been done by using a machine learning method with feature selection approach. Currently,...
This paper presents a novel framework for privacy aware collaborative information sharing for data classification. Data holders participating in this information sharing system, for global benefits are interested to model a classifier on whole dataset, but are ready to share their own table of data if a certain amount of privacy is guaranteed. To address this issue, we propose a privacy mechanism...
Wireless Sensor Network (WSN) has recently emerged as a new widely used technology. However, the deployment of such networks has reported high rates of failures. Due to resource constraints of sensor nodes, the design of efficient failure detection techniques has become a very challenging issue. Already proposed WSN fault detection protocols have reported either a high number of false suspicions,...
Breast cancer is one from various diseases that has got great attention in the last decades. This due to the number of women who died because of this disease. Segmentation is always an important step in developing a CAD system. This paper proposed an automatic segmentation method for the Region of Interest (ROI) from breast thermograms. This method is based on the data acquisition protocol parameter...
Distributed cyber-physical systems (CPS) are increasingly provided with an accurate and precise common sense of time using a variety of well established time distribution methods such as GNSS, IEEE 1588 and others. Less attention has been paid to the effective use of time in CPS and techniques and components to support such use. This paper reviews these topics and discusses critical components that...
Computer and telecommunications advances in the last years allowed new distributed applications developments. In this context, time synchronization is a very important issue. Many industrial sectors, such as financial and power, need to achieve high time accuracy. The IEEE 1588–2008 standard [1] defines the second version of PTP, designed to archive clock accuracy in the sub-microsecond range. Previous...
Various applications require or can benefit from high accuracy of synchronization between networked elements. The White Rabbit (WR) project includes enhancements to the now widespread IEEE1588 Precision Time Protocol (PTP) to support supplying synchronization in the sub-nanosecond level.
Tight synchronization timing is expected to play a crucial role for the realization of emerging Internet of Things (IoT) high value real-time applications such as smart transportation and smart grid. Most packet-based synchronization protocols require two-way communications delay symmetry for precise accuracy. The Precision Time Protocol (PTP) provides mechanisms to measure and take into account the...
This paper presents the use of unsupervised Gaussian Mixture Models (GMMs) for the production of per-application models using their flows' statistics in order to be exploited in two different scenarios: (i) traffic classification, where the goal is to classify traffic flows by application (ii) traffic verification or traffic anomaly detection, where the aim is to confirm whether or not traffic flow...
Traffic identification technique is used for classification of different network protocols and applications even with detection of users' network activities. In this paper, we conduct our study on some typical users' network activities and present a traffic identification method to describe the feature about users' behaviors. We convert users' network activities information into different sequences...
Recent advances in wearable sensing technologies have favored the search for reliable and objective methods of estimating motor symptoms and complications of Parkinson's disease (PD). In this paper, we present a complete system of motor assessment composed of Shimmer3 inertial measurement modules aimed to classify a series of daily life activities performed by PD patients and detect the occurrence...
In real environment, the protocol distribution of Network traffic is imbalance, and the generalization ability of supervised learning algorithm such as algorithm to C4.5 is poor. In order to improve the classification accuracy and stability of network traffic, a network traffic classification method based on Rotation Forest was proposed. In the method, PCA was used for feature reduction and C4.5 algorithm...
The number of security incidents is increasing and many of them are derived from malware activities. However, recent malware have become so sophisticated that commercial anti-virus software is not capable of detecting 100% of them. NTT Global Threat Intelligence Report shows that more than half of malware are not detected by commercial antivirus software [1]. Nowadays, post-infection countermeasure...
In this paper we propose an improvement of a human action recognition method that uses a string-based representation and a string edit distance to compare the observed action with reference actions in the training set. In particular, the original improvement is based on a specific formulation of the string edit distance that is more suited to take into account the problems related to noise and to...
The SSL/TLS, one of the most popular encryption protocol, was developed as a solution of various network security problem while the network traffic has become complex and diverse. But the SSL/TLS traffic has been identified as its protocol name, not its used services, which is required for the effective network traffic management. This paper proposes a new method to generate service signatures automatically...
In this paper an easy-to-use, wearable sensor system capable of deciphering upper-limb based functional tasks associated with stroke rehabilitation is introduced. Such a system can assist the therapist with monitoring a patient's progress during rehabilitation, and hence can increase the efficiency of the rehabilitation process. The developed system provides quantitative, real-time feedback of a user's...
With the acceleration of the Internet speed and the vigorous emergence of new applications, the amount of Internet traffic has increased. In order to provide stable Internet service, efficient network management based on accurate traffic identification is critical. Although various methods for traffic identification have been proposed, not a single method identifies all types of Internet traffic....
Software-Defined Network (SDN) is an emerging network paradigm which enables flexible network management by separating control plane from data plane. Since SDN adopts a centralized management scheme, with large scale SDN network, it brings intensive overhead to control plane. One way of limiting this overhead is to either distribute the overhead to multiple controllers, or offload the overhead to...
The traffic identification is a preliminary and essential step for stable network service provision and efficient network resource management. While a number of identification methods have been introduced in literature, the payload signature-based identification method shows the highest performance in terms of accuracy, completeness, and practicality. However, the payload signature-based method's...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.