The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article presents a survey of the factors that indicate evasion in distance education, as well as the data mining techniques that are being used in the detection of evasion. As a methodology, we have used the systematic review, analyzing the works published in the last five years. The result indicated that there are multiple factors that influence evasion, which were systematized in four dimensions,...
The Internet of Things(IoT) has been developing rapidly since the past decade. It is becoming a crucial part of everyday life. It is becoming a way of living in which machines perform activities on their own by communicating with each other, without the need for human beings to instruct them. In such a scenario, which concerns daily life, privacy, and secrecy should be of at most priority. Since in...
Ad-Hoc and Delay-Tolerant Networks (AHDTNs) can be very useful in environments where more traditional networking technologies fail. Determining the practical effectiveness of AHDTNs can however be challenging. We review design considerations and practical experience with a novel mechanism for monitoring and analyzing the performance of AHDTNs. This new mechanism, AllNet Trace, somewhat resembles a...
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution...
The original design of the Internet was a resilient, distributed system, that may be able to route around (and therefore recover from) massive disruption—up to and including nuclear war. However, network routing effects and business decisions cause traffic to often be routed through a relatively small set of Autonomous Systems (ASes). This is not merely an academic issue; it has practical...
We consider the economic and mathematical model of forming unified information Internet space for scientific and educational resources by integration of scientific and educational resources in certain “cloud”, based on the needs of consumers, the possibility of required generation in information sources and the availability of nodes (providers) in the network to organize the process of receiving,...
Current approaches to Information-Centric Networking (ICN) facilitate the publication and retrieval of content in a network through a variety of discovery, caching and forwarding approaches, thus defining an equivalent of the data plane in the current Internet infrastructure. However, in contrast to the current Internet, ICN lacks a definition of the control plane for the management of the operation...
Adult video content is considered to be responsible for a major portion of the Internet traffic. We present a preliminary characterization study of one of the largest and popular adult streaming service, xHamster. While there have been extensive analysis of mainstream user generated content sharing services such as YouTube, adult streaming services have been an underappreciated field of study for...
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
Content-Centric Networking (CCN) is a candidate next-generation Internet architecture that offers an alternative to the current IP-based model. CCN emphasizes scalable and efficient content distribution by making content explicitly named and addressable. It also offers some appealing privacy features, such as lack of source and destination addresses in packets. However, to be considered a fully viable...
For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper length-detecting is a straightforward yet efficient solution. Binary search strategy can reduce the number of required hash detecting in the worst case. However, to assure the searching path...
With the tremendous advances in the field of information and communications technology (ICT), and the emergence of new applications, such as 4K/8K, AR/VR, Internet of Things, and Industrial Internet and so on, the traditional Internet has faced severe challenges on scalability, flexibility, controllability, mobility and security and so on. In order to cope with these challenges, numerous promising...
Sensing of food spoilage and contamination is an active area of research, with many types of contact and noncontact sensors are being developed that can track fresh food quality throughout the distribution process. In this paper, we consider the communication of the sensed product quality along with the box position (in the stack of boxes in the truck or in a warehouse room) to the next level, in...
TCP LoLa is a new delay-based congestion control that supports both, low queuing delay and high network utilization in high speed wide-area networks. This is particularly useful for traffic mixes consisting of bandwidth demanding and delay sensitive flows (e.g., long file transfer and interactive "web 2.0" traffic). TCP LoLa keeps the queuing delay at the bottleneck link low around a fixed...
In this paper, we leverage two large-scale real-world datasets to provide the first results on the limits of predictability of cellular data traffic demands generated by individual users over time and space. Using information theory tools, we measure the maximum predictability that any algorithm has potential to achieve. We first focus on the predictability of mobile traffic consumption patterns in...
Ensuring the quality of online learning in higher education institutions is a growing concern in recent years. While several studies have focused on the perception of the quality of online education by academic staff and administrators, this research is based on student perceptions. This study used qualitative methods to investigate the perceptions of students from the Technical University of Moldova...
Smart Grid uses the TCP/IP protocol stack for wide area communications. To ensure low latency end to end communications, the FREEDM project chooses UDP datagram as the preferred technique. However, when many devices are using the same network resources, congestion can happen on intermediate routers. Unlike TCP, which uses ECN as an approach for congestion control, UDP does not have a similar implementation...
The virtual networking embedding (VNE) problem is a core issue in network virtualization. This is also a challenging problem as it contains different kinds of constraints, and its complexity becomes even higher in an online VNE problem with thousands of virtual network (VN) requests. In this paper, we proposed an ant colony system based VNE algorithm, called ACS-VNE, for the online VNE problem. The...
This article describes SECav, an educational software developed in the context of a research project, with the aim of supporting the teaching and learning processes of a Numerical Calculus course that is taught for several courses of the Exact and Natural Sciences Faculty of the UNLPam University. SECav focuses on the numerical resolution of nonlinear equations, polynomial interpolation and approximation,...
This work aims to present the planning, development (methodology) and implementation (technologies used) of the learnning object (LO) SegurIdade Virtual, as well as highlighting the learning experiences with the object. The material was built in game format and seeks to develop, in a playful way, the critical thinking of the elderly public for the safe use of the internet. The object was builded based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.