The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work investigates how social bots can phish employees of organizations, and thus endanger corporate network security. Current literature mostly focuses on traditional phishing methods (through e-mail, phone calls, and USB sticks). We address the serious organizational threats and security risks caused by phishing through online social media, specifically through Twitter. This paper first provides...
A process graph is a graph designed to visually explain the action of programs which make use of the fork and wait system calls. We outline a tool that automatically generates process graphs for a class of C programs. The key idea behind our tool is to use a program's control flow graph (CFG) to determine its process graph.
This study develops a unified pedagogy for the design and evaluation of e-learning software for high-school Computer Science. In accordance with the pedagogy, prototype e-learning software was developed for use in student instruction and independent learning. The pedagogy was iteratively refined based on the evaluation of teachers and education experts and the resulting e-learning software was developed...
Software Defined Networks (SDNs) provides a separation between the control plane and the forwarding plane of networks. The software implementation of the control plane and the built in data collection mechanisms of the OpenFlow protocol promise to be excellent tools to implement Machine Learning (ML) network control applications. A first step in that direction is to understand the type of data that...
The train control center is an indispensable component for the safe operation of high speed railways. This paper analyzes the software function and performance for the train control center subsystem in Chinese Train Control System level 3. It focuses on the editing of active balise telegram, based on the theory of timed automata and hierarchical modeling. First, we analysis the process and form a...
Continuous Integration (CI) is a common practice in agile software development processes. It improves the quality of the developed software and reduces the risk of integration problems. However, the effectiveness of CI depends heavily on the frequency of integration problems. For systematic improvement of the applied agile development process, the effect of large commits on the likelihood of integration...
The study aims to find out how email marketing can be applied to the development of internet marketing by Research and Technology Transfer Office (RTTO) in Bina Nusantara University. This research was designed using qualitative method and case study was adopted for the email marketing implementation. The data was collected from observation during the implementation of email marketing and visitor statistic...
We propose a difficulty model for generating questions across formal domains according to the difficulty level provided by the user. Our model is interactive and adaptive to user input. The model uses predefined factors for measuring the difficulty and a user defines the difficulty level by ordering these factors. We use lexicographical ordering to compare the difficulty of questions based on a user-defined...
In this paper, the generation and control turbulence in a wind tunnel, for design, analysis and testing of wind turbines is proposed. The designed wind turbines will be focused for domestic use. Modifications to the wind tunnel are made in order to generate the turbulences in the test chamber. Specifically, for the turbulence analysis, the reflective symmetry concept is used to group the different...
The stencil pattern represents a vast variety of applications, ranging from geophysics to medical science. In application codes, the stencil kernel is often the part where most of the time is spent, thus forcing an efficient parallel implementation of it. On the other side we know that stencil computations are often memory-bound, which requires sophisticated parallelization techniques to get scalable...
In this paper, a study on a flattened dihedral using reflect array approach is presented and a method is proposed to improve its performance. The dihedral-equipped with phase-shifting cells-obeys the retro directive phase law to redirect the wave back in the same direction of incidence. This retro-law is derived in function of the geometry parameters and plane wave incidence angle using simple trigonometric...
The paper proposes a concept to unify the tools used by software developers. The goal of the paper is to describe a conceptual framework, based on client-server architecture, which aims to simplify the introduction to new development tools for new users. The framework also tries to solve the issue with multiple tools serving the same purpose as well as making the process of switching between these...
Disruption/Delay tolerant networking (DTN) is a promising solution to mitigate the effects of periodic link outages that last seconds to minutes, which are prevalent in high capacity airborne tactical networks that are directional in nature and highly affected by aircraft body blockage. There are several considerations for applying the DTN Bundle Protocol (RFC 5050) in tactical edge networks which...
In this paper we describe ACyDS, an adaptive cyber deception system. ACyDS provides a unique virtual network view to each host in an enterprise network. That is, a host's view of its network, including subnet topology and IP address assignments of reachable hosts and servers, does not reflect physical network configurations and is different than the view of any other host in the network. ACyDS generates...
This paper presents a industrial processes simulator compatible with PLC Siemens S7-1200 implemented in LabVIEW software, it consists of two industrial processes (mixer and control level), this system provides help on the practical learning of industrial automation by means of PLC, thanks to its ease of use and performance indicators and existing failures.
Local Area Network(LAN) resides in organizations such as company, university and so on. In recent years, with the development of technology, these networks become large scale and consist of a large number of devices, and make the management of these networks difficult in terms of flexibility due to the constraint condition occupied by the devices and the lack of professional skilled management for...
Dynamic Software Updating (DSU) provides mechanisms to update a program without stopping its execution. An indiscriminate update, that does not consider the current state of the computation, potentially undermines the stability of the running application. To automatically determine a safe moment when to update the running system is still an open problem often neglected from the existing DSU systems...
In the 21st century student-teacher communication in high schools has been increasingly computer-mediated. This brings a strong demand for experienced professionals worldwide, preferably graduated in Information Technology. Until the 19th century the opportunity to attend university courses was a privilege of a few undergraduates, so that the student-teacher relationship was highly personalized. In...
Code clones, being an inevitable by-product of rapid software development, can impact software quality. The introduction of code clone groups and clone genealogies enable software developers to be aware of the presence of and changes to clones as a collective group, they also allow developers to understand how clone groups evolve throughout software life cycle. Due to similarity in codes within a...
Computer workers are in constant tension between meeting their deadlines and learning the tools they use to perform their jobs. Most often, the press to get work down overrides the importance of how to continually use the tool, and thereby improving performance over the long run. The lack of knowledge, however, results in constant interruptions to the workflow as the engineer tries to “bend” the tool...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.