The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The emerging field of Immersive Analytics investigates how novel display and interaction technologies can enable people to visualise and analyse data and complex information. In this paper, we present ContextuWall, a system for interactive local and remote collaboration using touch and mobile devices as well as displays of various sizes. The system enables groups of users located on different sites...
The wide spread of smart mobile devices such as tablets and phones makes mobile crowdsensing a viable approach for collecting data and monitoring phenomena of common interest. Smart devices can sense and compute their surroundings and contribute to mechanisms that examine social and collective behaviours. Crowdsensing offers a feasible alternative to exchange and compute sensing tasks and data between...
This paper proposes a new heating, ventilation, and air conditioning (HVAC) control system that acts as a home energy-management system (HEMS) function to prevent heat shock. Heat shock, which causes serious problems such as heart disease and cerebral infarction, occurs when people experience sudden temperature changes on moving from one room to another. The phenomenon occurs because of global warming,...
This paper assesses the potential cost-saving incentives for content distribution networks to shift traffic load among geographically distributed data centers in response to hourly variation in electricity prices. Such incentives are likely aligned with benefits to utilities and grid operators, which might take the form of peak-shaving or ancillary services. However, private cost savings are not strictly...
SDN orchestration, the problem of integrating and deploying multiple network control functions (NCFs) while minimizing suboptimal network states that can result from competing NCF objectives, is a challenging open problem. In this work, we formulate SDN orchestration as a multiobjective optimization problem, and present an evolutionary approach designed to explore the NCF tradeoff space comprehensively...
This system is concerned about measuring power using hall current sensor and intimate users regarding their power consumption. The data is transmitted in a wireless network and stored in a centralised server. ESP 8266 interfaced with Arduino Uno transmits the sensor data to Arduino Yun where it is pre-programmed to send an alert to the users at regular intervals. Intimation to the users also include...
Network middleboxes are difficult to manage and troubleshoot, due to their proprietary monolithic design. Moving towards Network Functions Virtualization (NFV), virtualized middlebox appliances can be more flexibly instantiated and dynamically chained, making troubleshooting even more difficult. To guarantee carrier-grade availability and minimize outages, operators need ways to automatically verify...
As Communication Service Providers (CSPs) adopt the Network Function Virtualization (NFV) paradigm they need to transition their network function capacity to a virtualized infrastructure with different Network Functions (NFs) running on a set of heterogeneous servers. This paper describes a novel technique for allocating server resources (compute, storage and network) for a given set of Virtual Network...
Microwave (MW) technology relies on volumetric heating. Thermal energy is transferred through electromagnetic fields to materials that can absorb it at specific frequencies. The principal objective of this work is to model and simulate the interactions of the MW field with a composite laminated part, consisting of a stack of layers of different orientations, each layer made of resin matrix and carbon...
The overlay network has been widely developed in recent years. There may be various overlays that co-exist with each other upon the same underlying network. These overlays have heterogeneous performance goals, and they will compete for the physical resources, so that a sub-optimal performance of the overlays may be achieved. Moreover, the heterogeneity of the overlays makes them difficult to coordinate...
Natural disasters (e.g. earthquake, tsunami, and eruption) are unavoidable casualties in the history of human being. In many incidents, people die due to lack of data such as the status of evacuation routes, pedestrians' traffic in the impacted area and real-time alert systems. Employing Unmanned Aerial Vehicles (UAVs) in this field of research is so beneficial for multiple reasons. For instance,...
Mobile messaging has become a trend in our daily lives. The current schema for messaging is to route all the messages between mobile users through a centralized server. This scheme, though reliable, creates very heavy load on the server. It is possible for users to communicate through peer-to-peer (P2P) connection, especially over urban networks characterized by heavy user traffic and dense network...
One of the biggest challenges teachers are facing is the inability of students to interact with each other. The instructor may ask for students' opinion, their ideas and whether they agree or disagree on a given problem or statement, without getting any feedback. However, some students have communication difficulties, and those who can have the correct answer may feel uncomfortable, and therefore...
The problem of the centralized caching is studied in a two-layer network. The first layer of the network is constructed by a server and K1 helpers, and the second layer consists of K1 orthogonal sub-networks, each of which contains a helper and K2 users. The pioneer caching design in the two-layer network is to directly apply the Maddah-Ali & Niesen (MAU) centralized caching [1] into individual...
We are developing a next-generation editable electronic textbook (e-textbook) education system called Gakuzai. In the Gakuzai system, an e-textbook is provided to teachers and students. In an e-textbook, users can remove (electronically hide) the unimportant parts of long descriptions, leaving only the important parts. This system will enable teachers to prepare documentation for their classes in...
In Content Delivery Networks (CDNs), knowing the popularity of video content helps the manager to take efficient decisions about which video content should be cached near the end users and also about the duplication degree of each video to satisfy the end user Quality of Experience. This paper focuses on predicting the popularity of video content, in terms of the number of requests. For that purpose,...
The centralized zone data service (CZDS) was initiated by the Internet Corporation for Assigned Names and Numbers (ICANN), a global Internet overseer, to facilitate sharing and access to zone data as hundreds of new generic Top-Level Domains (gTLDs) are added to the Internet. The goal of CZDS is to improve the security and transparency of the naming system. In this study, we explore CZDS's transparency...
Domain Name System (DNS) leakage occurs when queries for names within a private namespace are propagated in the public DNS infrastructure, which has various privacy implications. To reduce this leakage and improve Tor's privacy, Appelbaum and Muffet suggested in RFC 7686 the special-use of .onion domain name. They recommended how stub, recursive, and authority name servers should behave when encountering...
We consider networks where a set of end users, equipped with cache memories, are connected to a single server via a set of relay nodes. We further consider a special class of such networks that satisfy the so called resolvability property and study centralized coded caching scenarios under three security requirements. Under the first scenario, i.e., secure delivery, the wiretapper should not gain...
In this paper, we propose a simple security framework for MQTT (for short, AugMQTT) by incorporating the AugPAKE protocol [16]. As a distinguishing feature, AugMQTT does not require any certificate validation checks and certificate revocation checks on both publishers/subscribers and broker sides. Also, we discuss several aspects of AugMQTT followed by performance overhead of the AugPAKE protocol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.