Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The ability to perform vehicle tracking is very useful in daily life — today, such as security on personal vehicles, public transportation systems, fleet management and other mass transit. In this study, we designed an application of Geographic Information Systems (GIS) that will be applied to public transport services. This system provides real-time position tracking of each vehicle (taxi) and capable...
This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to generate a new altered output from which finally the messages are regained. Thus mixnets confirm unlinkability...
We present the design, implementation, and evaluation of Centaur, an application-level user-assisted message dissemination solution for Online Social Networks (OSN). Characteristics of OSNs make their message dissemination distinct from scenarios like multicast streaming and P2P file sharing. First, updates issued by each user are sporadic and the “online” follower set is highly dynamic. Hence, it...
Rendezvous is a necessary operation for cognitive users to establish communication links in cognitive radio networks (CRNs). To guarantee the rendezvous in finite time, all existing rendezvous algorithms generate CH (channel-hopping) sequences using the whole channel set and attempt rendezvous on each of the channels (i.e., both available channels and unavailable channels). In practice, the available...
Low rate TCP-targeted denial of service attack is a cleverly crafted attack in which an attacker exploits congestion avoidance algorithm and uniformity of min RTO in Transmission Control Protocol(TCP). Attacker congest the network for a brief period of time then keep quiet for some time. This phenomenon is repeated after min RTO time. This attack causes degradation of service and denial of service...
Proxy server was originally invented to enhance the performance of web browsing; however, it has been commonly used to perform online crime and malicious activities without being traced. Nevertheless, there is no general method available for detecting the use of stepping stones from the server's perspective. In this paper, based on Nagle's algorithm, we propose a server-based scheme to detect whether...
This study deals with the problem of maintaining large hierarchy folder replicated in a distributed environment. It was found that this problem afflicted a number of important applications, such as synchronization of Hierarchy Folders between Peer-to-peer environments, synchronization of data between accounts or devices, content distribution and web caching networks, web site mirroring, storage networks,...
Peer-to-peer (P2P) systems provide a scalable way to stream content to multiple receivers over the Internet and has become a major type of application traffic. The maximum rate achievable by all receivers is the capacity of a P2P streaming session. We provide a taxonomy of the problem formulations. In each formulation, computing P2P streaming capacity requires the computation of an optimal set of...
Most of existing transfer protocols performs poorly for transferring bulk data over fast long distance network. A key reason is the congestion control algorithm. This paper designs a novel congestion control algorithm, namely congestion detection and rate adaptation (CDRA) algorithm, which adjusts sending rate according to the congestion level of terminal in order to maximize transfer performance...
In this paper, a location service algorithm using swarm intelligence techniques, called SLS has been developed to provide location service to all MANET (Mobile Ad Hoc Network) routing protocols. MANET is a network with mobile nodes without Internet like infrastructure where every mobile node acts as a router. The location service is intended to solve the existing problems in MANET due to frequent...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.