The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Age estimation has recently become increasingly important for a variety of reasons including security, gaming, healthcare, and biometry. In this paper, we are interested in age estimation for content filters which could limit access to age-inappropriate content. Considering that the auditory response to sound varies with age, we provide in this paper preliminary insights about age estimation through...
Battery Simulator is a kind of test equipment commonly used in satellite power, electric vehicles and other power application fields. Design a battery simulator with a standard LXI bus interface is important for building a multi-instrument test system. This paper puts forward a SCPI instruction analytical platform based on LXI bus. Remote PC sends SCPI command over LXI bus. The communication board...
The Indian ‘smart cities’ have burgeoning population consuming the intelligent systems running over the city infrastructure and services. One critical set of such services is that of the emergency services involving Ambulances, Police and Firefighters. The services provided by these officials are often time critical, which makes their easy and quick availability a must have attribute. This paper proposes...
Over the last few years, increased interest has arisen with respect to age-related tasks in the Computer Vision community. As a result, several "in-the-wild" databases annotated with respect to the age attribute became available in the literature. Nevertheless, one major drawback of these databases is that they are semi-automatically collected and annotated and thus they contain noisy labels...
Many emerging IoT approaches depend on cloud services to facilitate interoperation of devices and services within them, even when all the communicating entities reside in the same local environment, as in many "smart home" applications. While such designs offer a straightforward way to implement IoT applications using today's TCP/IP protocol stack, they also introduce dependencies on external...
Cloud computing offers the potential for productivity, cost savings and innovation advantages to organizations. To utilize these benefits, to facilitate wide-scale cloud adoption and to embrace cloud computing, we must address many cloud security challenges. Attackers can compromise the vulnerable hosts and can either take over their resources or use them as stepping stones for future attacks. Open...
With the prevalence of cloud computing, privacy-preserving database outsourcing has been spotlighted. To preserve both data privacy and query privacy from adversaries, databases need to be encrypted before being outsourced to the cloud. However, there exists the only kNN classification scheme over the encrypted databases in the cloud. Because the existing scheme suffers from high computation overhead,...
In order to improve medical processes in nephrology, we present an application that allows doctors to create biopsy protocols by using a digital pen on a tablet. The biopsy protocol app is seamlessly integrated into the existing infrastructure at the hospital (see figure 1). Compared to other reporting tools, we provide (1) real-time hand-writing/gesture recognition and real-time feedback on the recognition...
Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in the cloud using Hadoop/Spark. In this paper, we discuss the importance of providing provenance capabilities in context of Hadoop as a service (HaaS) framework. We first review the state of the art in provenance tracking in context of databases and work-flow processing,...
There has been much recent interest in Private information Retrieval (PIR) in models where a database is stored across several servers using coding techniques from distributed storage, rather than being simply replicated. In particular, a recent breakthrough result of Fazelli, Vardy and Yaakobi introduces the notion of a PIR code and a PIR array code, and uses this notion to produce efficient protocols...
Variety of data has led to the fall of the "One size fits all" paradigm in databases. Applications now store data in multiple data representations, rather than just storing the data in a single relational database. However, applications only provide consistency semantics at the boundaries of a single datastore, corresponding to specific representation. This can lead to semantically inconsistent...
With the development of mobile Internet and FinTech (Financial Technology), clients are raising their expectations for online banking systems. They now expect bank information system to provide sustained services with high quality and require the online banking system to manage various operational risks. Existing research on the construction of highly available systems mainly solves the problems how...
Network renumbering in the IP world is a complicated and expensive procedure that has to be carefully planned and executed to avoid routing, security (firewall, ACLs) and transport connection integrity problems. The source of most of these issues is in the lack of a complete naming and addressing architecture in the TCP/IP protocol suite. This paper analyses the issues related to IP networks renumbering,...
This paper focuses on research device management mechanisms such as routers and switches, based on the NETCONF protocol, considered user authentication mechanisms using RADIUS-server and implementation of these mechanisms in currently being developed Eltex Network OS. Reflected the main features of NETCONF protocol — Network Configuration Protocol, produced theoretical and experimental comparison...
With the growth of Infrastructure as a Service (IaaS) in cloud computing, and the Internet of Things (IoT), network monitoring of the global infrastructure will continue to expand, as cybersecurity will become of primary importance. Current network monitoring approaches, particularly those that are agent-based, are proprietary, costly, and may not scale. This paper proposes a lightweight, scalable...
In this paper, we first define a new security problem, named mPSI (many-to-one private set interaction), which can find applications in many scenarios where the host of a big database may be queried by a large number of clients who have small-size queries and want to prevent both the intentions and results of their queries from being exposed to others. We also propose a new scheme to solve the mPSI...
In this paper, we design a distributed platform for anonymized dataset trading without any centralized trusted third party. The platform consists of peers and consensus-based blockchain mechanism, and each peer acts as a data broker, data receiver, or verifier for blockchain in a data transfer transaction. A data broker collects data from data owners under their consent for data trading. The Privacy...
From the perspective of services to the population, with vast social implications, in which the security, confidentiality, and access to personal data represents a critical region, the medical services and information systems that are on the base of the strategic management in health care systems, are a theme of maximum interest and rather less approached. In particular, the prospect of at-home health...
Operating System (OS) detection significantly impacts network management and security. Current OS classification systems used by administrators use human-expert generated network signatures for classification. In this study, we investigate an automated approach for classifying host OS by analyzing the network packets generated by them without relying on human experts. While earlier approaches look...
This paper describes the first results of the evaluation of the use of Hippocratic Protocol, on mobile terminals with NFC technology. The evaluation is based on a software application written to ANDROID terminal and used by two type of users: Doctors and Patient. Complementing this app, a server and a database implemented with open source resources was created too. The software developed during this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.