The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Keyloggers is the action of recording the key stroke on a keyboard, typically in a covert manner. Software Keyloggers are detected based on the behavioral characteristics. They don't provide root privileges; detection is based on permission from kernel and prone to many attacks. Software Keyloggers is a software program that can be installed onto a computer, which monitors all the user activities...
University of Lampung (Unila) as an academic institution should provide the internet service for thousands of users, monitoring the condition of electricity (Voltage, Current, Power factor, Power, and Energy consumption measurement) at ICT center building has an important role, as a part of maintenance lifecycle to make sure the internet services running well, system monitoring implemented in order...
Health monitoring involves sensing, reporting, and sometimes adjusting the states of objects or nodes remotely. This paper describes the design and implementation of a real-time distributed hardware health monitoring framework, assuming a homogeneous set of hardware nodes. The framework consists of sensor components operating at the nodes, and visualization components operating at monitoring stations...
With the ever increasing technology integration, the analysis, operation and control of power system is becoming more and more complicated. Grid Computing is one of the solutions for integrating such a large and complicated system. Grid Computing integrates computational resources from various geographical and administrative locations to accomplish a common task. This paper presents a review on the...
The applications that are data intensive and large-scale is run by data centers based on Map Reduce implementation. Map Reduce runs on large clusters which needs vast amounts of energy which parallel increase cost of the data centers, Energy reduction has to be incorporated into the map reduce implementation to improve the efficiency of the data center. In order to achieve the good performance, model...
Cloud computing technologies are suited for reducing costs of maintaining IT infrastructure and initial investment. As cloud computing is developed, problems of power consumption for maintaining the cloud computing environment are occurred. So, several studies for reducing power consumption have been performed. However study for predicting power consumption in cloud computing environment is insufficient...
Green computing has become one of the hottest trends in recent years. In this research area, the major purpose is to reduce the energy consumption as well as the CO2 emission. Obviously, this topic has been the important issue in the field of electronic and computer engineering. In fact, energy factor might be considered to be a significant cost when running any computing system. Basically, energy...
In this article we have discussed the learning skills that are required to help students gain the full benefits of learning within Intelligent Tutoring Systems (ITS). On the one hand, students need to use metacognitive strategies to manage their learning, particularly when they have freedom to determine how they access and use a variety of on-line resources. On the other hand, ITS must includes relevant...
Wireless sensor network (WSN) is commonly used for localization analysis. Through sniffing receive signal strength indication (RSSI) in WSN system, localization of higher RSSI is connected automatically. This paper proposes the Raspberry-Pi (RasPi) based sensor node to sniffing RSSI and automatically connect the device to strongest RSSI. The RasPi brings the advantages of a personal computer (PC)...
The coverage is a critical issue in WSNs and considered as a measure of the service quality of WSNs. We proposed a coverage optimal algorithm based on Virtual Distance (VD) to enhance the coverage of WSNs after initial random placement. We define the ideal position of node related to its neighbor, and then the distance vector of one node's real position to ideal position is defined as virtual distance...
The study intends to measure the efficacy of teacher training on techno pedagogy and its effect on students learning in academic subjects like Science, Mathematics and Geography. We randomly selected 10 middle schools (@ 2 schools from 5 districts), observed twenty randomly selected teachers and their students over a 1year period and did a learning achievement tracking of students. Measuring tools...
We provide a review of the state of the art on the design and implementation of random number generators (RNGs) for simulation, on both sequential and parallel computing environments. We focus on the need for multiple independent streams and substreams of random numbers, explain how they can be constructed and managed, review software libraries that offer them, and illustrate their usefulness via...
This paper presents a proposed approach called VAIL System Call Monitor (VSCM) to detect and thwart previously unknown code injection attacks. The idea is based on the fact that any process needs to correctly invoke CreateProcess() system calls, otherwise child-process creation will fail. VSCM intercepts and verifies CreateProcess() system call invocations from a monitored process. In case an unknown...
The paper promotes the use of ICT for an E-Participation prototype for the Local Government Unit specifically in the Barangay level. E-Participation provides officials and the community interaction to produce information concerning policies and decision making through technological tools. The study incorporates the different types of E-participation namely E-informing, E-Consulting, E-Involving, E-Collaborating...
With the further development of computer and network technologies, information security requirements in semiconductor field has been elevated to a new stage. Owing to the developments of advanced (e.g., 28nm and 14nm) technologies and the applications in high confidentiality arenas, more and more semiconductor design and manufacture companies realize the needs of tighter and more systematic controls...
The monitor display can be eavesdropped by measuring and analyzing the compromising electromagnetic emanations. These electromagnetic emanations of video display interfaces are generated by electric signals on the display panel or the cable between the computer and the monitor. In this paper, the radiated signals from video display interface of Video Graphics Array (VGA) cable are measured and analyzed...
Today the world is under virtually constant attack, targeted by increasingly sophisticated and well funded attackers. The increasing efficacy of cyber threats continues to highlight the inadequacies of traditional defense mechanism such as firewalls and Intrusion Detection System. The security analyst however focuses on finding the technical deficiency but do not consider the adversaries motivations...
Increased dependency of the human society on the Electrical Energy, demands extra provision for sophisticated monitoring and control. The Monitoring of the Electrical System involves observing whether all the electrical parameters like voltage, power, current are within the scheduled limits or not and the Controlling of the Electrical System involves the necessary actions that are to be taken if the...
This paper presents an effective system for the detection and tracking of intrusion in a secure space with the use of digital image processing techniques and embedded systems. The proposed method is able to identify intrusion, send alerts and then track the object of interest. First an adaptive background subtraction model has been suggested for the detection of intrusion. This adaptive method uses...
In virtualized environment, several computers run on a physical computer. Many of virtualization systems have a ballooning function with which memory allocation size for a virtual machine can be dynamically changed without restarting the virtual machine. Thus, it is expected that performance of an applications in a virtual machine can be improved by dynamic optimization of the virtual machine memory...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.