The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper discusses new scheduling algorithms that are modifications of classical cycle based scheme, named the cycle based algorithm with time alternating priorities and time guard. The classical cycle based algorithm assumes that a given packet stream can be served only in predefined periods while it is not entitled to receive service in the periods dedicated to serve other packet streams. This...
This paper proposes a method of TCP multi-pathization for IoT network by SDN. The method distributes packets according to the congestion between paths and IP packet length. Since it is performed over SDN, no changes of existing protocols and devices are required. The authors implement the method by actual IoT devices and evaluate QoS by experiment. The results of the experiment show that the TCP throughput...
This paper presents a real-time, low-cost, wireless, AC and DC monitoring system based on an ATmega328P-PU microcontroller. The proposed system is composed by different client nodes, which have the task to measure the main electrical quantities involved in the system, and a server node that collects the data and send them to a display device. The system is well suited for a good accuracy monitoring...
The deployment of modular virtual network functions (VNFs) in software defined infrastructures (SDI) enables cloud and network providers to deploy integrated network services across different resource domains. It leads to a large interleaving between network configuration through software defined network controllers and VNF deployment within this network. Most of the configuration management tools...
Cloud Data Center (DC) service orchestration and resource management are important applications of the Software Defined Networking (SDN) paradigm. In this paper, we introduce a novel dynamic allocation strategy for Virtual Machine (VM) allocation called Enhanced multi-objective Worst Fit (E-WF). E-WF combines the multi-objective Best Fit and Worst Fit allocation strategies, and it exploits the history...
Software Defined Networking (SDN) presents a unique opportunity to manage and orchestrate cloud networks. The educational institutions, like many other industries face a lot of security threats. We have established an SDN enabled Demilitarized Zone (DMZ) — Science DMZ to serve as testbed for securing ASU Internet2 environment. Science DMZ allows researchers to conduct in-depth analysis of security...
Residential networks are home to increasingly diverse devices, including embedded devices that are part of the Internet of Things phenomenon, leading to new management and security challenges. However, current residential solutions that rely on customer premises equipment (CPE), which often remains deployed in homes for years without updates or maintenance, are not evolving to keep up with these emerging...
With increasing evidence on the breadth and potency of side-channel attacks based on resource sharing, virtual machine (VM) placement in infrastructure cloud services, such as Amazon EC2, has become an important security problem. In this paper, we present a new approach to this problem by letting users specify their own trust profiles, and then incorporating such information into VM placement decisions...
Urban electrical distribution networks are mostly comprised of Medium Voltage (MV) ring distribution feeders to improve reliability. Transformers connected to MV feeders transfer power from MV network to Low Voltage (LV) distribution networks. In underground LV distribution networks, feeder pillars are used to branch out LV feeders emerging from distribution transformers. Currently, the existing distribution...
Recent studies demonstrated that multipronged exercise interventions comprising aerobic, resistance and corrective therapeutic components resulted in endurance and strength improvement and reduction of fatigue and spasticity in patients with multiple sclerosis (PwMS). However, telerehabilitation support of multipronged exercise programs in PwMS has received limited attention. The goal of this project...
Mobile cloud computing paradigm enables cloud servers to extend the limited hardware resources of mobile devices improving availability and reliability of the services provided. Consequently, private, financial, business and critical data pass through wireless access media exposed to malicious attacks. Mobile cloud infrastructure requires new security mechanisms, at the same time as offloading operations...
The elastic provisioning of Virtual Infrastructures (VIs) enables a dynamic management of cloud resources (computing and communication) in order to meet the hosted application's requirements. Thus, to perform elasticity requests, providers usually rely on reallocation mechanisms and policies. The concerns regarding the environment and the operational costs indicate energy consumption of the data centers...
Due to the advances of wireless sensor networks, radiofrequency identification (RFID) and Web-based services, large volume of devices have been interconnected to the Internet of Things (IoT). In addition, the tremendous number of IoT services provided by service providers arises an urgent need to propose effective recommendation methods to discover suitable services to users. In this paper, we propose...
Domain generation algorithms (DGAs) automatically generate large numbers of domain names in DNS domain fluxing for the purpose of command-and-control (C&C) communication. DGAs are immune to static prevention methods like blacklisting and sinkholing. Detection of DGAs in a live stream of queries in a DNS server is referred to as inline detection. Most of the previous approaches in the literature...
This study attempts to develop and design an occupational exposure declaration and monitoring system software for medical staff with multiple functions and convenient for users, which will be the beneficial supplement of Hospital Information system (HIS). Through investigation and documents research, we try to comprehend the procedure of occupational exposure declaration and monitoring, determine...
In the big data era, the information about the same object collected from multiple sources is inevitably conflicting. The task of identifying true information (i.e., the truths) among conflicting data is referred to as truth discovery, which incorporates the estimation of source reliability degrees into the aggregation of multi-source data. However, in many real-world applications, large-scale data...
The purpose of this research is to explore and identify the vulnerabilities in OpenEMR 5.0.0, which is a free and open source medical practice management application. We are to provide recommendations/suggestions to OpenEMR developers on identifying the vulnerabilities. We chose to use vulnerabilities scanning tools to manually explore the demo site of OpenEMR 5.0.0. The targeted vulnerabilities belong...
In this era of depleting fossil fuels and global warming, alternative sources of energy are critical to mankind's survival, making its study imperative for energy engineering students. This work demonstrates the design, development and implementation of a remote triggered experiment to analyze wind data and correlate it with Weibull and Rayleigh distributions performed in coastal Kerala, in southwest...
Network Function Virtualization (NFV) is a promising solution for telecom operators and service providers to improve business agility, by enabling a fast deployment of new services, and by making it possible for them to cope with the increasing traffic volume and service demand. NFV enables virtualization of network functions that can be deployed as virtual machines on general purpose server hardware...
Current Network Function Virtualization (NFV) with Virtualized Network Functions (VNFs) running as virtual machines on commodity servers enables flexibility to Service Function Chaining (SFC). Specific applications may require Quality of Service (QoS) on end-to-end latency. However, the processing delay and the queuing delay of VNFs varies with virtual resource configurations (vCPU and vMemory), as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.