The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advent of big data phenomenon in the world of data and its related technologies, the developments on the NoSQL databases are highly regarded. It has been claimed that these databases outperform their SQL counterparts. The aim of this study is to investigate the claim by evaluating the document-oriented MongoDB database with SQL in terms of the performance of common aggregated and non-aggregate...
Smart Grid companies are looking for communication infrastructure to support remote control, automation, and monitoring. But, these companies are not fully confident in budding LTE technology for M2M (Machine-to-Machine) applications, although it has been proved to be a promising technology for H2H (Human-to-Human) communications. LTE MTC (Machine Type Communications) is a part of the upcoming release...
Recently companies have applied two-factor user authentication. Persistent Authentication is one of the interesting authentication mechanisms to establish security and usability of two-factor authentication systems. However, there is room to improve its feasibility and usability. In this paper, we propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust...
Overseas patent lawsuits and infringements of intellectual property rights have been increasing. As the Internet expands and globalization progresses, Japanese companies become more exposed to the risk of lawsuits overseas. Thus, digital forensics technology has been attracting attention. This technology enables the digital data a company manages to be disclosed as proof when a lawsuit is generated...
Email has become widely used in recent years bringing with it new problems. Although this event doesn't happen often, misdirected emails can bring out great information leakage. It is not easy to detect these misdirected emails from legitimate ones since they may be only distinguishable in the sender's perspective. Existing methods discover misdirected emails from user agent or gateway but are not...
The article describes a new concept of Advanced Metering Infrastructure (AMI) system architecture with a cloud computing technology. Each smart meter will be equipped with a Wi-Fi module and a power-line communication (PLC) module. The PLC technology will be used to send control and configuration signals and for administrative purposes. This is a completely new approach in a relation to the currently...
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and...
Scientific computing over the Web can be applied to solve problems of many types, namely as appear in the activity of companies. In this study, the computation is done with two remote servers, without the user's perception, thus disclosing no clues on the computation. As an illustration, we make use of random sampling, which is needed in many activities, such as manufacture and research. Sampling...
With the development of the economy and the expansion of market capacity, companies that launching new types of the services need to conduct enterprise location in the newly developed market to serve the customers. In order to maximize the profit, companies should balance the rent and the customer flow volume, as well as service income and customers' waiting cost, which means that the companies should...
In this paper, an intelligent SCORM-based e-learning system, SELS (abbreviation of SCORM-based E-Learning System) was designed and implemented for a multinational enterprise (MNE). The main purpose of the SELS was to integrate all affairs for training employees and managing curriculums. The proposed SELS contains five sub-systems including curriculum registering, online learning, enterprise document...
With the rapid development of cloud computing, it is attractive for enterprise companies to outsource their data files for sharing in cloud servers, as cloud computing can offer desirable characteristics, such as on-demand self-service, broad network access, and rapid elasticity. However, by uploading data files onto cloud servers, data owners (i.e. the companies) will lose control over their own...
Large enterprises are confronted with an increased need to fully understand the IT systems that support their business applications. Unfortunately, conventional communication trace-based approaches to discovering IT infrastructure dependencies are insufficient to gain a comprehensive mapping of business applications to IT infrastructure. This paper describes BizMap, a novel, information-discovery-based...
A choice of basic system of design of the printed-circuit boards (PCB) is carried out, the main functions of system of the topological tracer of "TopoR" are revealed. Features of the WEB organization of the focused version of SAPR of topological design of software and realization of this system on the basis of cloudy INTERNET technologies are defined.
The availability of up-to-date information to people is an important requirement in many scenarios such as companies and civil institutions. In this regard, most establishments either use websites, emails or notice boards. However, in developing countries internet access is not available to many people on their mobile devices because of high costs. Moreover, having an electronic notice board requires...
A Document Management System (DMS) helps store, search, track, share, and retrieve documents of different types including text files, spreadsheets, presentations, and images. A DMS is a core technology used by several companies for managing their electronic documents and is often the central component of content management systems. A DMS may be used locally, on a network, or in the cloud. A question...
Persistent network communication can be found in many instances of malware. In this paper, we analyse the possibility of leveraging low variability of persistent malware communication for its detection. We propose a new method for capturing statistical fingerprints of connections and employ outlier detection to identify the malicious ones. Emphasis is put on using minimal information possible to make...
India is one of the world's biggest producers of fruits and vegetables but its share in the global horticulture market is insignificant. So ,The aim behind developing this app is to give India's huge farming community a fair and consistent price for their produce. Using this android based app "Virtual Fruits Market", will help some of the farmers to overcome this problem. Using this app...
The remain undetected threat, backdoor is a computer based cryptosystem or an algorithm or the form of an installed program, it is a method of bypassing normal authentication, securing unauthorized remote access to a computer, hackers benefit obtaining access to plaintext and users' sensitive information. The research on Backdoor is keep vigorous as the day passes and more new threats have been detected...
The senior project course for engineering students has a vital role in enhancing the “learn by practice” education engineering students in any university. The senior project course is, usually, a two semester course. This short time frame, poses challenges for both students and faculty. Students have to achieve the outcomes of the project to a certain extent and the faculty has to manage, follow up...
In developed country, it is necessary to develop high value-added products such as smart appliances in order to maintain international competitiveness of the manufacturing industry. The value of a smart appliance is not depended on only the product itself but also its service. The services of a smart appliance are provided by the cloud. The method of developing various services of smart appliances...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.