The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fear of technology, computer illiteracy and linguistic challenges are the prime concern for uplifting the day to day lives of rural mass. This paper describes a unique platform called Gyansetu (meaning Knowledge Bridge) with specialized hardware and software, which simplifies the access of information from internet for the rural mass. The interactive GUI used within the framework is more image-driven...
Recently, Network Function Virtualization (NFV) has been getting the attention for reason of operational efficiency, cost savings and service scalability. The NFV can be described as integrating an independent software on the general purposed hardware such as server and switch in order to replace the legacy hardware-based network device. Therefore, NFV can help ensure that carriers can quickly respond...
Gender equality and empowerment of women is accepted universally as an important aspect of development. In India there is a high gender gap in literacy, high dropout rate in girl students, high incidence of crime against women, high negligence in economic freedom, low involvement in decision making and very low recognition for their efforts and contribution in agriculture and allied sectors. The scenario...
Software as a Service (SaaS) is one of the major service models of cloud computing and a new software delivery model, in this software delivery model, software is hosted centrally, is licensed to users on subscription basis, and typically is accessed by users through a Web browser. Before SaaS was introduced, the traditional software delivery model was Software as a Product (SaaP): software was sold...
Results of substation equipment inspection are analyzed by the background system of the substation patrol robot, so the background system needs the perfect test. However, there are deficiencies in current test environment. This paper proposes a simulation test system for substation patrol robot which is aimed at overcoming these deficiencies. The simulation test system consists of a simulation control...
This paper presents a new method for Computer Hardware Experiment teaching. Previous hardware experiments of computer is built on a computer connected to a hardware equipment locally, and then student operate the hardware devices on the switches, buttons, etc. to carry out experiments and verify the developed hardware code is correct. Such experimental methods have lots of significant limitations...
Large scale applications in data centers are composed of computers connected with a network. Traditional network switches do not perform routing based on packet contents. Thus, packets cannot be transmitted to the optimal computer for the request which is written in the packet payload. On the other hand, Deeply Programmable Network (DPN) switches can completely analyze packet payloads and perform...
Educational Universities are gradually enhancing the traditional delivery mode towards blended learning, virtual classrooms and distance learning with the help of technology to reach the various demands of programs needed by people around the world. Learners are looking for specific programs of their interest, regardless of the location. Modern learning trends depend more on the technology and electronic...
Botnet is a collection of infected computers i.e. collection of zombie PCs which are remotely controlled by a single person or a group so called botmaster. In the recent years, botnets are becoming stealthier in nature by implanting certain techniques to hide themselves such as fast flux or DGA algorithms to generate the domain names. Generally, the class of botnet can be categorized into two major...
Online healthcare system provides healthcare services remotely to the patient which include telecare medicine system, patient monitoring system, patient healthcare system etc. Authentication schemes plays a significant and crucial role in providing legitimacy of patient and protection to medical resources/services. New trends in cryptography make the online healthcare services feasible solution to...
Interaction and visualization are two significant methods for both business people and scientists to find “gold nuggets” buried in raw data. These two methods can simplify complex theories and make it easier for people from different research areas to cooperate. Many prevalent web-based data interaction and visualization tools and libraries are not as effective as before because of big data. Most...
Analyzing the behavioral patterns to maintain the workload in cloud computing is very important. There are number of cloud data centers that have the facility to maintain this. But this paper has provided the approach for resource utilization based on two metrics, energy and cost function. This approach works within the workload which helps to understand the relationship between users and servers,...
Distributed Denial of Service (DDoS) is one kind of attacks using multiple computers. An attacker would act as a fake service requester that drains resources in computer target. This makes the target cannot serve the real request service. Thus we need to develop DDoS detector system. The proposed system consists of traffic capture, packet analyzer, and packet displayer. The system utilizes Ntopng...
IOPS performance as one of the important variables in the selection of storage would be devastasting if the server used for virtualization. If within one server has more than one virtual machine, the performance is given on those servers will be reduced and not optimal. Therefore, to increase the need for the use of server storage performance accelerator. Currently, PernixData FVP already implemented...
Indonesia has high mortality caused by cardiovascular diseases. To minimize the mortality, we build a tele-ecg system for heart diseases early detection and monitoring. In this research, the tele-ecg system was enhanced using Hadoop framework, in order to deal with big data processing. The system was build on cluster computer with 4 nodes. The server is able to handle 60 requests at the same time...
This poster looks at adapting Intrusion Detection Systems solutions to multiple SDN based domains. We present a preliminary evaluation of the performance in terms of latency cost while offering IDS solutions as a service (IDSaaS) in SDN. The goal is to eventually be able to determine what resources are needed in order for the IDSaaS in SDN to perform in a manner that is almost comparable to running...
Banking Malware, has become a popular and ever more prevalent mechanism to monetise malware development. Since the development of the Zeus malware kit in 2007, the frequency and complexity of banking malware has been increasing. Developing a good understanding of the operation of a malware family is a first step in the reverse engineering required to create tools to extract the malware configuration,...
Methods and ways to perform denial-of-service attack are analyzed and classified in this work. Famous Denial-of-Service attack classifications are reviewed and analyzed. New elements of modern DoS attack classification are proposed.
We notice, in our experiments with three malware samples of Darkcomet, Andromeda, and Zeus, that all three of them generate highly periodic network traffic. In addition, while there are a few works on intrusion detection which are based on this periodic behavior of malware, the prevalence of this behavior among the malware families in the wild is unknown. In this paper, we conduct an extensive experimental...
Chat application is a feature or a program on the Internet to communicate directly among Internet users who are online or who were equally using the internet. Chat applications allow users to communicate even though from a great distance. Therefore, this chat application must be real-time and multi platform to be used by many users. The development of information and communication technologies are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.