The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In view of the information leakage brought by removable storage device, the paper designed and implemented the anti-leak security system based on C\S architecture. The system taken filter driver technology to provide fine-grained and flexible access control over removable storage devices and file transparent encryption and decryption, and implemented the effective monitoring of removable storage devices...
In order to ensure the security of the sharing service in grid, a dynamic authorization model based on trust mechanism is presented, which is based on role-based access control. In the model authorization is obtained while the trust worthiness of the bargainers exceeds the trade threshold; it also introduces the concepts of task and condition into the authorization model so that it can achieve dynamic...
User's behaviors in information systems have different formats in different working modes, they mean users' intention actually. API callings, menu selections or requests are the familiar base elements of software behaviors, and different technologies are required to monitor and understand them. In information systems, it is necessary to insure that users' software behavior is trusted while processing...
We study truthful mechanisms for hiring a team of agents in three classes of set systems: Vertex Cover auctions, How auctions, and cut auctions. For Vertex Cover auctions, the vertices are owned by selfish and rational agents, and the auctioneer wants to purchase a vertex cover from them. For k-flow auctions, the edges are owned by the agents, and the auctioneer wants to purchase k edge-disjoint s-t...
This paper investigates vehicle health monitoring system (VHMS) on electric wheel truck. VHMS is connected with the control system of the electric wheel truck. It has local real-time system clock, mass size nonvolatile memory, and several interfaces such as Universal Serial Bus (USB), RS-232 and Ethernet for data transmission and download communication. Using General Packet Radio Service (GPRS) module,...
Aiming at the growing phenomenon of cheating in exams using radio-technology, the paper introduces a radio anti-cheat system. It monitors the frequency band occupied by cheating signal (voice signal mostly), and then fires interfering signals in the corresponding frequency band so as to achieve the purpose of suppressing the cheating signal. The performance of interfering signals is very important...
This paper describes a new botnet that we have discovered at the beginning of December 2009. Our Net Flow-based network monitoring system reported an increasing amount of Telnet scanning probes. Tracing back to a source we have identified world wide infected DSL modems and home routers. Nowadays, various vendors use Linux in this kind of devices. A further investigation has shown that most of deployed...
As the visits to databases in the network application become more and more, the DBMS, which is the core of network calculation, attracts increasing attention. The research on the self-calculating, which mainly includes self-configuring, self-restoring, self-optimizing and self-protecting, handles the internal resources management of the DBMS. But it can't handle the management of external workload...
In the field of structural health monitoring of concrete bridges, one of the most important problems is the crack identification. In previous studies, sensitive skin for bionic crack monitoring of concrete bridges had been used to monitor the crack initiation and development in a concrete structure, and it was visualized by computer. But there are several problems that prevented this method from being...
Monitoring large chunks of unused IP address space yields interesting observations and useful results. However, the volume and diversity of the collected data makes the extraction of information a challenging task. Additionally, the maintenance of the monitoring infrastructure is another demanding and time-consuming effort. To overcome these problems, we present several visualization techniques that...
We are witnessing pervasive use of wireless sensor networks (WSN)s in a wide variety of applications such as monitoring of road infrastructure. As they are expected to be deployed in harsh environments for long durations, the research community have turned their attention to tapping on ambient energy to power such networks. However, since energy harvesting rates are still significantly lower than...
Self-optimisation will enable future wireless networks to manage themselves in a continuous and independent way. By dynamically adjusting relevant radio parameters during network operation a system that adapts to environmental changes can be created. This paper presents a novel self-optimisation algorithm based on Fuzzy Logic Controlling. Taking into consideration measurements gathered from the network,...
The growing problem of spectrum scarcity and the inefficient spectrum utilization in the licensed bands, are addressed by the emerging Cognitive Radio (CR) paradigm. It is seen that the choice of the spectrum bands, called as spectrum decision, must be organized carefully by considering the challenges in the spectrum availability over time, the short term fluctuations in the availability, and the...
This paper describes a medical IT platform based on Wireless Sensor Networks and e-textile which supports indoor location-aware services as well as monitoring physiological parameters, such as ECG, heart rate, body temperature, etc., from a group of patients within hospital facilities. The paper presents the architecture, system deployment and validation results based on local test as well as on a...
This works illustrates the LAURA system, which performs localization, tracking and monitoring of patients hosted at nursing institutes by exploiting a wireless sensor network based on the IEEE 801.15.4 (Zigbee) standard. We focus on the indoor personal localization module, which leverages a method based on received signal strength measurements, together with a particle filter to perform tracking of...
In this paper indoor wireless Infrared (IR) technology for healthcare monitoring is studied. Monitoring provides a continuous and reliable vital sign measurement to secure patient staying in the hospital. Considering that patient moving is inevitable, we focus on a mobile IR channel based on diffuse propagation. A model of mobile channel is developed through the study of statistical distributions...
This paper presents the functionalities involved in enabling the use of compartments in wireless access networks for achieving capacity and coverage optimization. Compartments are defined as dynamic medium-term federations of collaborating elements for intelligent organizational purposes. The work presented in the paper uses compartments as a self-management apparatus for emerging wireless access...
Due to the severe resource constraints of sensor hardware, energy efficiency is one of critical factors for monitoring the movement of the large-scale phenomena such as wild fire and hazardous bio-chemical material, denoted by continuous objects. In order to save energy, most of existing research on tracking the continuous objects focuses on finding the ways to minimize the communication cost through...
Energy efficiency becomes evergreen than ever before. Over the last few years a significant research in wireless communications, aiming to enhance communications efficiency subject to constraint of power consumption, has given rise to optimization techniques of power control and management in wireless networks. Although the initial target was the utilization of resources in order to exploit communications...
This paper discusses some possible roles for emergency pollution accident in drinking water sources. Different procedures have been developed to measure the pollutants content of drinking water both in normal and in emergency situations, such as those arising from accidental and terrorist events. The authors analyze the primary factor of emergency pollution incident in drinking water sources and give...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.