The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The deployment of modular virtual network functions (VNFs) in software defined infrastructures (SDI) enables cloud and network providers to deploy integrated network services across different resource domains. It leads to a large interleaving between network configuration through software defined network controllers and VNF deployment within this network. Most of the configuration management tools...
Cloud Data Center (DC) service orchestration and resource management are important applications of the Software Defined Networking (SDN) paradigm. In this paper, we introduce a novel dynamic allocation strategy for Virtual Machine (VM) allocation called Enhanced multi-objective Worst Fit (E-WF). E-WF combines the multi-objective Best Fit and Worst Fit allocation strategies, and it exploits the history...
Software Defined Networking (SDN) presents a unique opportunity to manage and orchestrate cloud networks. The educational institutions, like many other industries face a lot of security threats. We have established an SDN enabled Demilitarized Zone (DMZ) — Science DMZ to serve as testbed for securing ASU Internet2 environment. Science DMZ allows researchers to conduct in-depth analysis of security...
Residential networks are home to increasingly diverse devices, including embedded devices that are part of the Internet of Things phenomenon, leading to new management and security challenges. However, current residential solutions that rely on customer premises equipment (CPE), which often remains deployed in homes for years without updates or maintenance, are not evolving to keep up with these emerging...
With increasing evidence on the breadth and potency of side-channel attacks based on resource sharing, virtual machine (VM) placement in infrastructure cloud services, such as Amazon EC2, has become an important security problem. In this paper, we present a new approach to this problem by letting users specify their own trust profiles, and then incorporating such information into VM placement decisions...
Urban electrical distribution networks are mostly comprised of Medium Voltage (MV) ring distribution feeders to improve reliability. Transformers connected to MV feeders transfer power from MV network to Low Voltage (LV) distribution networks. In underground LV distribution networks, feeder pillars are used to branch out LV feeders emerging from distribution transformers. Currently, the existing distribution...
Recent studies demonstrated that multipronged exercise interventions comprising aerobic, resistance and corrective therapeutic components resulted in endurance and strength improvement and reduction of fatigue and spasticity in patients with multiple sclerosis (PwMS). However, telerehabilitation support of multipronged exercise programs in PwMS has received limited attention. The goal of this project...
Mobile cloud computing paradigm enables cloud servers to extend the limited hardware resources of mobile devices improving availability and reliability of the services provided. Consequently, private, financial, business and critical data pass through wireless access media exposed to malicious attacks. Mobile cloud infrastructure requires new security mechanisms, at the same time as offloading operations...
The elastic provisioning of Virtual Infrastructures (VIs) enables a dynamic management of cloud resources (computing and communication) in order to meet the hosted application's requirements. Thus, to perform elasticity requests, providers usually rely on reallocation mechanisms and policies. The concerns regarding the environment and the operational costs indicate energy consumption of the data centers...
Due to the advances of wireless sensor networks, radiofrequency identification (RFID) and Web-based services, large volume of devices have been interconnected to the Internet of Things (IoT). In addition, the tremendous number of IoT services provided by service providers arises an urgent need to propose effective recommendation methods to discover suitable services to users. In this paper, we propose...
Domain generation algorithms (DGAs) automatically generate large numbers of domain names in DNS domain fluxing for the purpose of command-and-control (C&C) communication. DGAs are immune to static prevention methods like blacklisting and sinkholing. Detection of DGAs in a live stream of queries in a DNS server is referred to as inline detection. Most of the previous approaches in the literature...
This study attempts to develop and design an occupational exposure declaration and monitoring system software for medical staff with multiple functions and convenient for users, which will be the beneficial supplement of Hospital Information system (HIS). Through investigation and documents research, we try to comprehend the procedure of occupational exposure declaration and monitoring, determine...
In the big data era, the information about the same object collected from multiple sources is inevitably conflicting. The task of identifying true information (i.e., the truths) among conflicting data is referred to as truth discovery, which incorporates the estimation of source reliability degrees into the aggregation of multi-source data. However, in many real-world applications, large-scale data...
The purpose of this research is to explore and identify the vulnerabilities in OpenEMR 5.0.0, which is a free and open source medical practice management application. We are to provide recommendations/suggestions to OpenEMR developers on identifying the vulnerabilities. We chose to use vulnerabilities scanning tools to manually explore the demo site of OpenEMR 5.0.0. The targeted vulnerabilities belong...
In this era of depleting fossil fuels and global warming, alternative sources of energy are critical to mankind's survival, making its study imperative for energy engineering students. This work demonstrates the design, development and implementation of a remote triggered experiment to analyze wind data and correlate it with Weibull and Rayleigh distributions performed in coastal Kerala, in southwest...
Network Function Virtualization (NFV) is a promising solution for telecom operators and service providers to improve business agility, by enabling a fast deployment of new services, and by making it possible for them to cope with the increasing traffic volume and service demand. NFV enables virtualization of network functions that can be deployed as virtual machines on general purpose server hardware...
Current Network Function Virtualization (NFV) with Virtualized Network Functions (VNFs) running as virtual machines on commodity servers enables flexibility to Service Function Chaining (SFC). Specific applications may require Quality of Service (QoS) on end-to-end latency. However, the processing delay and the queuing delay of VNFs varies with virtual resource configurations (vCPU and vMemory), as...
Multipath TCP (MPTCP) has gained great attention by the researchers and network application developers due to its features providing better bandwidth utilization and higher reliability recently. Utilizing MPTCP in the datacenters provides performance gain to the applications. If the underlying network has Software Defined Networking (SDN) architecture, the routing of the MPTCP subflows can be specialized...
The Extensible Messaging and Presence Protocol (XMPP) is one of the most popular Instant Messaging (IM) protocols which uses a client-server working mode. This protocol uses different connection primitives for both client-to-server (c2s) and server-to-server (s2s) connections. It is actively used in mission-critical operations where the reliability and security of communication systems is always imperative...
This study investigates the effect of image rescaling and format changing hosted in a RESTful API architecture considering transfer time as a critical factor to apply lane detection on a external server. We employ Probabilistic Hough Transform to perform the detection because it is invariant to pixel position and robust to noise. Before being trasmitted to the external server, images are rescaled...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.