The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this study the prosodic effect on the temporal realization of segments in Chinese is analyzed. The test segments are in the form of ‘C1V1#C2V2’, with ‘#’ varied to be intonational phrase boundary and intonational phrase medial position, and C2 varied to be labial, alveolar and velar stop. The subjects are fourteen native speakers of standard Chinese. The VOT of the consonants and the durations...
The context of the European Space of Higher implies new Telecommunication Engineers trained in technical knowledge and professional skills. Problem-Based Learning and Project-Based Learning (PBL) are appropriate to achieve an effective learning of these skills. This paper presents a design of project-based learning course in Telecommunications Engineering degree from the University of Extremadura...
The increased usage of net-centric IP applications at the tactical edge has pushed DoD communications systems to maximize bandwidth efficiency amid a limited availability of RF spectrum. One method of increasing bandwidth efficiency (especially with the desire to move to IPv6), is the use of IP header compression (IPHC) to compress headers from the network layer and above into small identifiers before...
The development of skills through active learning methodologies has been demonstrated to be appropriate in environments where students must acquire particular professional capacities. Problem-Based Learning (PBL) embeds strudents' learning processes in real-life problems so, they can integrate different subjects in a common project that they need to solve in a self-directed way. In this context, we...
In the development of context-aware applications it is important the existence of applications/platforms that are responsible for the discovery and processing of context information and make it available to be used by these applications. This work presents an autonomous system for characterizing the context of a public place with information about its location, environmental conditions and the nature...
Cellular systems operate under restrictive constraints of resources including radio channel capacity and network processing capability. The tremendous growth in the cellular data network usage brings operators with unprecedented signaling overloads and threatens the stability of the network. Understanding the characteristics of the subscribers who are resource inefficient has an important significance...
In network level forensics, Domain Name Service (DNS) is a rich source of information. This paper describes a new approach to mine DNS data for forensic purposes. We propose a new technique that leverages semantic and natural language processing tools in order to analyze large volumes of DNS data. The main research novelty consists in detecting malicious and dangerous domain names by evaluating the...
Intrusion detection is often described as having two main approaches: signature-based and anomaly-based. We argue that only unsupervised methods are suitable for detecting anomalies. However, there has been a tendency in the literature to conflate the notion of an anomaly with the notion of a malicious event. As a result, the methods used to discover anomalies have typically been ad hoc, making it...
Extending IPv6 to IEEE 802.15.4-based Low power Wireless Personal Area Networks requires efficient header compression mechanisms to adapt to their limited bandwidth, memory and energy constraints. This paper presents an experimental evaluation of an improved header compression scheme which provides better compression of IPv6 multicast addresses and UDP port numbers compared to existing mechanisms...
In this article we introduce the concept of MP-pseudoinvexity for general nonlinear impulsive optimal control problems whose dynamics are specified by measure driven control equations. This is a general paradigm in that, both the absolutely continuous and singular components of the dynamics depend on both the state and the control variables. The key result consists in showing the sufficiency for optimality...
The cloud computing landscape has recently developed into a spectrum of cloud architectures, leading to a broad range of management tools for similar operations but specialized for certain deployment scenarios. This both hinders the efficient reuse of algorithmic innovations within cloud management operations and increases the heterogeneity between different management systems. Our overarching goal...
Advent of 4 G networks, IPv6 and increasing number of subscribers to these indicate that each mobile device will have its own IP address and virtually become a hotspot. In the coming years, systems that track and record our movements will indispensably be integrated in our everyday life. Location-based systems: dashboard navigation systems, Internet enabled smart phones with GPS features, and electronic...
Mobile users are increasingly demanding multimedia content created specifically or at least tailored to cater for their needs and preferences. In this scope, context-sensitive networking embeds promising technologies for allowing the design of personalized multiparty service applications. The Context Casting (C-CAST) project designed context-sensitive network architecture to support personalized multiparty...
We propose in this paper an on-line algorithm based on Bloom filters to detect port scan attacks in IP traffic. Only relevant information about destination IP addresses and destination ports are stored in two steps in a two-dimensional Bloom filter. This algorithm can be indefinitely performed on a real traffic stream thanks to a new adaptive refreshing scheme that closely follows traffic variations...
Botnet is a great threat of the Internet nowadays. For now, Botnet has transformed to the complex one based on HTTP, P2P protocols from the simple Botnets which based on IRC protocol. In this paper, we evaluate the key features of HTTP Botnet and design a new method to detect the HTTP Botnet based on feature analysis. The experiment result shows that our method is effective and efficient on detecting...
3rd Generation Partnership Project (3GPP) proposes relay architecture to extend the coverage and enhance the system capacity of Long Term Evolution Advanced (LTE-A). In the relay architecture, the header compression mechanism called RObust Header Compression (ROHC) is introduced to eliminate packet overhead and provide better spectral efficiency for IP packet transmission over the radio. However,...
The IEEE 802.11ai is an upcoming fast initial link setup (FILS) amendment that could enable a STA to achieve secure link setup in less than 100 ms. A successful link setup process will then allow the STA to send IP traffic with a valid IP address through the AP. In this paper, we first present a performance analysis on how well the legacy 802.11 can support FILS. We then demonstrate that the rate...
The overhead portion especially for a small packet is one of the most significant parameters that can lower the efficiency of the link utilization. Therefore, many traditional hop-by-hop header compression techniques were introduced to reduce the amount of packet header before transmission. However, those techniques still cannot overcome the time performance issue as compression mechanism requires...
Feedback is an important ingredient to enhance athletes' skill acquisition. Currently, feedback design in the motor skill domain via Computer-based Sport Training (CBST) can be categorized as: (1) feedback content, such as speed, accuracy, movement, time, and reaction time, (2) providing athletes with access to their feedback via an appropriate user interface, and (3) feedback modality, such as visual,...
To address shortcomings of the current Internet, many researchers are taking a clean-slate approach toward re-designing the Internet. These so-called clean-slate approaches discard the old assumptions, design principles, and constraints of the current Internet, set aside concerns about compatibility with existing software, and rebuild the entire network from scratch. Clean-slate approaches have the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.