The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) paradigm envisions a world of interconnected objects in which every object or thing can be univocally addressed and accessed, independently of its inherent technology and location. To the date, most of the state-of-the-art solutions proposed to realize the IoT vision employ a cloud-based approach. This means that, independently on where objects are physically located,...
There are many methods for detecting harmonic current in grid, which have different characteristics. Ip-iq detection method based on instantaneous reactive power theory is complex and various link, when the grid voltage is unbalanced, the grid synchronization signal error will appear, and low-pass filter (LPF) in harmonic detection link brings influence about rapidity. In order to detect the harmonic...
To provide an emergency alert signaling to digital receiving devices such as Set-Top Box(STB), The Emergency Alert signaling (EAS) framework is required to allow cable operators to disseminate emergency alert information related to emergencies and warnings rapidly. However, most existing devices do not comply with the EAS requirements because it was regarded as an optional function for handling EAS...
Software defined networking (SDN) technology promises a new bright future to IP network. Significant number of SDN researches have been done so far to facilitate network operation and management efficiently. However, until now there are only few frameworks to support emulation, verification, and implementation of the SDN. Mininet is one of the most popular tools because of the openness, cost effectiveness,...
The wide spread use of Internet allows advertisers to reach significantly more consumers through online advertisement compared to traditional advertising media. However, currently online advertisement is facing challenges associated with advertisement (ad) frauds such as ad replacement, ad stacking, click fraud, and click hijacking. It is important to teach students this emerging topic, and help students...
Total ionizing dose effects in analog configurable application specific integrated circuits such as analog gate array and programmable analog gate array were analyzed. Dominant failure mechanisms and potentially radiation sensitive internal units were determined within −60…+125C temperature range. +125C area corresponds to the minimal radiation hardness.
Sparse-code multiple-access (SCMA) is a novel multiplexing method to increase the capacity of wireless communication systems. By giving users non-orthogonal codebook with few non-zero entries, the SCMA approach can highly improve the spectral efficiency, compared with traditional orthogonal ones such as CDMA, with tolerable detection complexity. Therefore, it has been considered as an option for 5G...
Distributed Denial of Service (DDoS) attacks serve to diminish the ability of the network to perform its intended function over time. The paper presents the design, implementation and analysis of a protocol based upon a technique for address agility called DDoS Resistant Multicast (DRM). After describing the our architecture and implementation we show an analysis that quantifies the overhead on network...
Threats within the network are a security risk with which you deal daily. Due to this, the use of more complex means of security than the Firewall should be considered to perform the analysis of the traffic behavior of the network by means of devices of next generation such as Systems of Detection and Prevention of Intrusions (IDPS). This article presents a comparison of commercial systems and open...
In this paper, an effective approach to Simultaneous Localization and Mapping (SLAM) based on RGB-D images is presented toward autonomous operation of a Leg/Arm Composite Mobile Robot (LACMR), in which depth information and its effective features are utilized sufficiently so as to overcome some malpractice in conventional methods and enhance the performance of SLAM. Our scheme can be narrated as follows...
We address security and trust in the context of a commercial IP camera. We take a hands-on approach, as we not only define abstract vulnerabilities, but we actually implement the attacks on a real camera. We then discuss the nature of the attacks and the root cause; we propose a formal model of trust that can be used to address the vulnerabilities by explicitly constraining compositionality for trust...
Software Defined Networking (SDN) is a developing networking paradigm that advocates a complete overhaul of the conventional networking. SDN decouples the control logic from the data forwarding functionality; which traditionally are coupled on the network device. The coupling stifles innovation and evolution because the network often becomes rigid. Software Defined Wireless Sensor Networks (SDWSN)...
Advances in technology and the need to meet many interdependent competing requirements have led to complex information intensive systems that can be best managed by integrating multi-discipline, multi-attribute models for better informed decision-making. Attempts to bridge the gap between systems engineering and project management have been sought through project management methods and through imposing...
The article considers existing simulation methods implemented under the conditions of the ensured uniformity and required accuracy of the results in the evaluation of the stability of functioning of the information structure security system in the conditions of negative influences. The evaluation of the sustainability of an information structure security system in terms of negative impacts is initially...
Smart objects (SOs) have been utilized widely to transform the physical environment around us to a digital world using the Internet of things (IoT) vision. Integrating a huge number of these devices into the Internet presents a significant necessity for an efficient discovery mechanism with high capability of an autonomous configuration and detection for theses devices and their provided services...
The nature of Internet traffic has changed dramatically within the last few years, where a large volume of traffic is originated from mobile applications (known as apps), web based multimedia streaming, computation offloading like cloud computing and Internet of Things (IoT) etc. These types applications generate multiple parallel short lived end-to-end connections. However, the three major requirements...
Software Defined Networking (SDN) enables a centralised entity - the controller - to monitor the network’s status by collecting traffic statistics such as packets, bytes, etc. Each statistic is associated with a forwarding table entry (FTE) in a switch whose structure and format is specified by the OpenFlow standard (de-facto SDN standard). For a flow with a FTE, its statistic is easily...
The rise of Software Defined Networking (SDN) presents an opportunity to overcome the limitations of rigid and static traditional Internet architecture and provide services like network layer multicast for live video streaming. In this paper we propose mCast, an SDN-based architecture for live streaming, to reduce the utilization of network and system resources for both Internet Service Providers...
This paper describes the development of a data exchange protocol for self-organizing computing environments with minimal latency. The protocol is implemented using standard software libraries for mobile device networks. The neighborhood method involves building a route using two broadcast requests, and the method proposed here is implemented using two broadcast requests. One of these requests is issued...
The purpose of this work is to present a study procedure and channel fading description, developed with MATLAB simulation. The channel is simulated as a FIR (Finite Impulse Response) filter. The multipath channel fading parameter modeling are based on Rayleigh's distribution principles. It is also introduced a Doppler effect analysis and transmission loss rate due to noise.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.