Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Digitization has played a profound role in promoting the transition of the traditional teaching mode of landscape architecture. The traditional teaching mode of the landscape architecture curriculum cannot fully meet the needs of the new design curriculum. Based on the existing problems and taking advantage of digitization technology platform, this paper proposes to build a landscape architecture...
The centralized search engine has problems of excessive server load and limited extended ability when dealing with the massive Internet information. And the search results of general search engine is not so accurate. To solve these problems, a vertical search engine based on Hadoop called HVSE was designed and developed. HVSE was based on the basic principle of the traditional search engine. It improved...
Content-Centric Networking (CCN) is an attractive future Internet architecture that enables rapid data retrieval due to its native in-network caching mechanism. However, existing caching policies in CCN do not always perform effectively in terms of the user-centric performance that is typically measured by the content download time. This is because they have been designed to improve network-centric...
Smart spaces are currently developed for different kinds of applications. We want to describe a smart space for the production of tailor-made clothes. In the paper, we review the production process for tailor-made clothes. Then, we describe the architecture for the smart production space. We describe the advantages of such a model for different commercial services that can be linked to the online...
Internet infrastructure developments and the rise of the IoT Socio-Technical Systems (STS) have frequently generated more unsecure protocols to facilitate the rapid intercommunication between the plethoras of IoT devices. Whereas, current development of the IoT has been mainly focused on enabling and effectively meeting the functionality requirement of digital-enabled enterprises we have seen scant...
Named Data Networking (NDN) has been considered as a promising networking technology that makes up for the limitation of current IP networking. However, due to its early stage, there are still a lot of open issues in NDN research. From the issues, the limitation of changing namespace keeps an application from modifying its namespace or adding additional namespace after once the namespace was fixed...
Information-centric networking (ICN) stands out as a promising solution to replace the Internet. In the ICN architecture, the content is the major element and the data name is used for routing the content, instead of the address location as in the Internet nowadays. Furthermore, it is desirable to cache as much data as possible near the user, aiming to improve performance and reduce data transfer...
In the last couple of years Software Defined Network (SDN) have come into existence which empowers network operators with more flexibility to manage and program their network. This type of network solves the limitation of legacy networks. Data plane and control planes are separated from each other as a result data plane devices simple act as a packet forwarding device and leaving the decision making...
The case of Critical Infrastructures (CIs), and especially Cyber-Physical CIs, which nowadays rely on computers and the Internet for their operation, is an important research area. Decentralized Critical Infrastructure management systems play a key role in reducing costs and improving the quality of service of industrial processes, but also they introduce various security vulnerabilities. In this...
Location Base System (LBS) is considered one of the most beneficial technologies in our modern life, commonly imbedded in varies devices. It helps people find their required services in the least amount of time based on their positions. The users submit a query with their locations and their required services to an un-trusted LBS server. This raises the flag of user privacy where the user has to have...
The paper considers problems of developing the parallel hybrid fluid-based model and methods to solve them. The main reasons of falling of GPU performance that had arisen during development and ways to address them are described. The method for describing the structures of networks using routes adjacency matrix is provided. Also several methods to evaluate line matrix summation are considered and...
Along with continuing advancement of network and chip technology, vast amount of new router designs will be designed and utilized in differentiated Internet-connected systems, on-chip interconnection in SoC, and evolving software-defined networks. In this research, from an analysis of current and future router designs, we observe that router designs share a common composition structure. We thus devised...
Aadhaar, India's Unique Identity Project, has become the largest biometric identity system in the world, already covering more than 920 million people. Building such a massive system required significant design thinking, aligning to the core strategy, and building a technology platform that is scalable to meet the project's objective. Entire technology architecture behind Aadhaar is based on principles...
A hardware implementation of RSA encryption based on Montgomery algorithm with modular multiplication and systolic array architecture is presented. In this paper, we present an extension of RSA core from 512 key lengths to 1024 key length under hardware platform. The design uses two block multipliers as the main functional unit and Block-RAM as storage unit for the operands. To extend the core from...
Many approaches have been proposed to build a unified IoT platform where physical and digital objects are accessible by applications crossing different organization and domains, and are based on IP-overlay architecture. These solutions inherit the constraints of the current internet, especially in terms of naming, heterogeneity, mobility and security. In this paper, we propose a new Information-Centric...
More cooperation or coordination is necessary for future UDN (Ultra-Dense Network) scenario of 5G network, of which ICIC (Inter-Cell Interference Coordination) is a promising and typical scheme. Cooperating cellular network may be thought as a special kind of distributed computing system, whose basic theory and toolsets could be adopted. CAP theory for distributed computing state that any networked...
With the rapid growth of Internet traffic, new emerging network architectures are under deployment. Those architectures will substitute the current IP/TCP network only if they can ensure better security. Currently, the most advanced proposal for future Internet architecture is Named Data Networking (NDN). However, new computer network architectures bring new types of attacks. This paper focuses on...
Communication architecture is a crucial component in smart grid. Most of the previous researches have been focused on the traditional Internet and proposed numerous evolutionary designs. However, the traditional network architecture has been reported with multiple inherent shortcomings, which bring unprecedented challenges for the Smart Grid. Moreover, the smart network architecture for the future...
Smart Identifier NETwork (SINET), as a novel proposal for future Internet architecture, is expected to make the current Internet flexible. SINET is featured by completely resolving the triple-binding related issues of current Internet, namely resource-location binding, user-network binding and control-data binding. Due to thorough and rigorous redesign of the Internet, SINET is equipped with many...
With the proliferation of Internet access across the globe, as well as the advancement of many new devices and next generation networks, there is no surprise that malware infection via web browsing is still one of the most significant threats to Internet users today. Over the past several years we have also seen the increase in advanced targeted attacks against corporations which steal intellectual...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.