The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) presents a unique opportunity to manage and orchestrate cloud networks. The educational institutions, like many other industries face a lot of security threats. We have established an SDN enabled Demilitarized Zone (DMZ) — Science DMZ to serve as testbed for securing ASU Internet2 environment. Science DMZ allows researchers to conduct in-depth analysis of security...
It presents the design and implementation of a manufacturing system integrating information and control technologies to provide an access to the user into part of the production system. A distributed control system is structured using didactic plants which emulate a manufacturing system of soft drinks. The control system is developed in Codesys®, integrating its operation through a monitoring system...
Recent studies have shown that attackers can force deep learning models to misclassify so-called “adversarial examples:” maliciously generated images formed by making imperceptible modifications to pixel values. With growing interest in deep learning for security applications, it is important for security experts and users of machine learning to recognize how learning systems may be attacked. Due...
The reports from last years outline the fact that the web crawlers (robots, bots) activities generate more than a half of web traffic on Internet. Web robots can be good (used for example by search engines) or bad (for bypassing security solutions, scraping, spamming or hacking), but usually all take up the internet bandwidth and can cause damage to businesses that rely on web traffic or content....
NetsBlox is a visual blocks-based programming language that supports distributed programming. NetsBlox includes Remote Procedure Calls (RPC) that provide access to a set of online scientific data sources such as maps, weather, earthquakes, astronomy imagery, air pollution, etc. This demonstration shows how to use these RPCs to create engaging science projects.
Nowadays, collaborative systems and applications are widely used to allow multiple users to work together in order to achieve one same goal. In the field of virtual and augmented realities, such collaboration is often sought to effectuate complex activities in some relevant experiences. Users can share virtual objects, but most importantly, they use collaborative 3D interaction, visualize their objects...
A novel approach for robot tracking and identification based on barcodes is proposed in this paper. The proposed system tracks robots fitted with barcodes identifying them. The system performs distributed visual processing and collaborative barcode tracking, whereby the nodes exchange processed visual information with appropriate neighboring nodes, informing them about incoming targets. The proposed...
Medicai and healthcare study programmes cover various curricula consisting of many theoretically focused courses and clinical teaching training. Curriculum attributes usually contains thousands of requirements on the form of knowledge and skills which fully define a complete graduate profile. It is not humanly possible to go through the entire curriculum or to imagine how the individual courses, learning...
Software visualizations are used to support stakeholders in software engineering activities like development, project management, and maintenance. The respective tasks determine which aspects of software, i.e., structural, behavioral and/or evolutionary information, need to be visualized. To promote the usage of software visualizations they have to optimally support the needs of the respective stakeholder...
With the rapid development of Internet technologies such as cloud computing and big data, the scales of distributed information systems in big companies have grown to enormous sizes. Automatic detection and diagnosis of system faults in the large-scale information systems is complicated and important in both practice and research. In this paper, we propose a Graph-based Fault Diagnosis approach in...
This article selects load balancing system technology to analyze, combines the live migration technology of virtual machine, and studys the frame of virtual machine live migration as well as the mathematical model applied to concrete process of the migration. The article presents that the process of combining the specific strategies of load balance to the frame of live migration, that the simulation...
Visualization became one of the solutions in showing the attack on the network. With Visualize the attack, it would be easier in recognizing and conclude the pattern from the complex image visual. The target of DoS attacks can be addressed to the various parts of the network, it can be routing, web, electronic mail or DNS servers (Domain Name System). The purpose of the DoS attacks create a server...
New opportunities exist for applications such as disaster incident response that can benefit from the convergence of Internet of Things (IoT) and cloud computing technologies. Particularly, new paradigms such as Mobile Edge Computing (MEC) are becoming feasible to handle the data deluge occurring in the network edge to gain insights that assist in real-time decision making. In this paper, we study...
This paper is an exhibition of graph matchingresults, in a classification context. We present Photo(Graph) Gallery, a platform that allows one to visually interpret graphmatchings. We aim at understanding the computed matchingsin order to improve the rates of graph classification. Preliminaryresults of the study performed on two data sets are also illustrated. Furthermore, a demonstrator of our proof-of-concept...
Using the automated vehicle location data combined with other technologies such as automated incident reporting, transit decision makers can now execute a variety of real-time strategies and performance evaluations. In this study, we show that it is possible to develop an easy to use but powerful web-based tool which acquires, stores, processes, and visualizes bus trajectory data. The developed web-based...
Properly choosing a profession is one of the greatest challenges for individuals because the repercussions of this choice can significantly alter people's lives. From this perspective, the psychology offers its instruments, aiming to provide reflection and self-knowledge through professional guidance. The work of professional guidance leads the subject to know himself, in the sense of enabling a choice...
In this paper, a Web application that allows people with speech impairments to train and amend pronunciation of words by repeating words presented in a interface with visual and auditory stimuli, is presented. With this app, we aim at present a training assistive tool to be used by the user, in a daily situation, where the main asset is the feedback about the rate of correct pronunciation, thus allowing...
Smart parking solutions for big cities are critically important for reducing traffic congestion and vehicle energy consumption in big cities. Visual-based detection methods have been proposed since their maintenance costs are typically lower. However, visual based detection methods in existing systems are not robust due to varying light intensities, occlusions, and their deployment costs can still...
Inter-vehicular communication (IVC) can be explored to build a live map of vehicles for enhancing collaborative vehicular applications related to traffic statistics, safety by accident prediction and prevention, and energy efficient route planning. For enhancing the abovementioned applications, a live map of vehicles associated with their communication identities (e.g., IP/MAC addresses) of other...
Visual data are rich, which have opened vast analytics opportunities and been widely used in many applications. However, the demanding requirements of computational resources and bandwidth have prevented the data from being useful in an economically efficient manner. A visual fog paradigm is needed for efficient processing of continuous video streams by collaboratively using things in the Internet...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.