The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web cache replacement plays important role in increasing the performance and speed of browsing web sites using internet. This paper highlights a new proposed Average Least Frequency Used Removal (ALFUR) and compares it with web cache replacement techniques like (LFU, LRU, SIZE, and PCCIA). Hit Ratio (HR) and Byte Hit Ratio (BHR) were used to measure the performance of these algorithms, and it was...
Tremendous interest prevails in developing a convenient and effective wearable medical device for evaluating sleep at home. The current study presents the clinical validation of VitalPatch®, a wireless adhesive patch sensor for screening of sleep architecture compared to the gold standard polysomnograph (PSG). A group of 45 volunteers were attached to a standard 22-channel PSG and a VitalPatch sensor...
Increasing hospital re-admission rates due to Hospital Acquired Infections (HAIs) are a concern at many healthcare facilities. To prevent the spread of HAIs, caregivers should comply with hand hygiene guidelines, which require reliable and timely hand hygiene compliance monitoring systems. The current standard practice of monitoring compliance involves the direct observation of caregivers' hand cleaning...
There is a spectrum of solutions are available for distributing content over the Internet today. One of these solutions is Content distribution networks (CDN). CDN need to make decisions, such as server selection and routing, to improve a performance of content distribution. But we must remember, that performance may be limited by various factors such as packet loss in the network, a small receive...
This paper proposes a novel methodology for the calculation and estimation of transmission line impedance with the use of real time data from synchrophasor measurement units. Current synchrophasor standards do not provide impedance data and must therefore be calculated. The algorithms used in this paper include impedance calculation, outlier detection and elimination as well as denoising using regularized...
Ionospheric scintillation monitoring is becoming an increasing research activity in order to devise countermeasures to the harmful effects ionospheric activity has on positioning services based on Global Navigation Satellite Systems (GNSS). The amount of amplitude fluctuations in GNSS signals due to scintillation is estimated by the �������� index. For this purpose, traditional closed loop architectures...
Cyber deception is usually synonymous with nefarious activities led by attackers. Motivated attackers will stop at nothing to accomplish their mission and deception is amongst the tools they use. Cyber defenders have also begun using deception as an instrument to further enhance overall defensive strength. Deception has been leveraged to research attacker behaviors and their associated tactic techniques...
Application Performance Monitoring (APM) is crucial to any enterprise to ensure that the performance of its application or service is meeting the service level agreements. There is an inherent need for the APM of traditional networks to evolve, with the advances in the internet technologies. In this paper, we present a novel approach and framework for realizing a futuristic APM for Software Defined...
Color characteristics of computer monitors and similar display devices can significantly alter the way an image is perceived by the human eye. Modern cameras and software applications are able to create vibrant scenes and retain their original colorfulness through an embedded ICC[1] profile. Gamut differences between input and output mediums require color management techniques in order to preserve...
ChatOps is an industry practice of conversation-driven development using instant messaging to automate common development or monitoring tasks. It makes team members communicate with each other efficiently to work, learn and create together. We expect ChatOps to have intelligent agents, which can perform predictive operations based on users' activities, in the near future. To enable such intelligent...
This paper proposes an efficient data-based anomaly detection method that can be used for monitoring nonlinear processes. The proposed method merges advantages of nonlinear projection to latent structures (NLPLS) modeling and those of Hellinger distance (HD) metric to identify abnormal changes in highly correlated multivariate data. Specifically, the HD is used to quantify the dissimilarity between...
The Cloud Security Alliance lists data theft and insider attacks as critical threats to cloud security. Our work puts forth an approach using a train, monitor, detect pattern which leverages a stateful rule based k-nearest neighbors anomaly detection technique and system state data to detect inside attacker data theft on Infrastructure as a Service (IaaS) nodes. We posit, instantiate, and demonstrate...
Critical services in the field of Network Function Virtualization require elaborate reliability and high availability mechanisms to meet the high service quality requirements. Traditional monitoring systems detect overload situations and outages in order to automatically scale out services or mask faults. However, faults are often preceded by anomalies and subtle misbehaviors of the services, which...
Elasticity is the most important feature that differentiatescloud computing from traditional IT infrastructure. Itdefines the capacity of cloud infrastructure provider to acceleratethe provision or the deprovision of the resources needed to deployclient's services. Auto-scaling resource is typically done usingtwo models: reactive and proactive. Most previous researchesmanage elasticity with a single...
Many multimedia applications exhibit a phasic behavior. Phasic behavior of applications has been studied primarily focused on code execution. However, temporal variation in an application’s memory usage can deviate from its program behavior, providing opportunities to exploit these memory phases to enable more efficient use of on-chip memory resources. In this work, we define memory phases as opposed...
Devices that monitor and measure various system parameters or physical phenomena form an integral part of cyber-physical systems. Such devices usually operate continuously and gather important data that is often critical for the operation of the underlying system. Thus, it becomes important to understand and detect abnormal or malicious device behavior, false injection of data by an adversary, or...
BGP measurement is important for monitoring and understanding the Internet anomalies. Most of the previous works on BGP measurement rely on aggregated statistics from BGP monitors, e.g., total updates. However, BGP events may have quite limited visibility. Therefore, merely investigating aggregated data may lead to misunderstanding Internet instability, e.g., overestimating the impact of monitor-local...
In this paper, we develop an efficient design for a decision engine (DE) with anti-jamming (AJ) capability for advanced wideband satellite communication (SATCOM) systems. Our goal is to design a decision engine that evaluates the statistical observations of spectrum and link metrics provided by the co-located dynamic spectrum access (DSA) components. Upon the evaluation of the observations provided...
Large-scale, carrier-grade Network Functions Virtualisation (NFV) services are expected to involve a significant number of Virtual Network Functions, deployed across multiple Points-of-Presence (PoPs) and possibly in heterogeneous infrastructures. While proper monitoring is crucial for the commercial viability of NFV services, effectively and efficiently monitoring a huge number of VNF instances,...
This paper presents the latest functional safety innovations at the power management level of a System Basis Chip (SBC), from the development phase to system design, underscoring the link to reliability and how to enable hardware that is safety ready. The presentation will also demonstrate how using architecture developed for Automotive Safety Integrity Level (ASIL) can help improve the functional...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.