Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this booming digital era, everything is going online. Out of which, online shopping and online retail applications gets mammoth share. Many people shifting their focus towards online shopping to that of brick and mortar shops. So this has made online business a boom. But, at the same time it is also being threatened by many advanced attacks on these online applications. Flash Crowd Attack is one...
The spatial join is usually processed in two steps: filter and refinement. The first creates candidate pairs based on the objects' abstractions, like object pairs having overlapping minimum bounding rectangles (MBRs). The second step then further checks each candidate pair whether the objects fit the join condition with their actual shapes. This two-step strategy prevents the disk I/O and CPU overhead...
Despite the advancement of cloud storage and the benefits it brings to computer users, it cannot be denied that cloud storage is still subject to misuse by malicious users and cyber criminals. This includes the cases where criminals use cloud storage for storing and exchanging illegal material and for committing botnet attacks. In addition, the increase in the number of cybercrimes against cloud services...
The number of small-and mid-cap companies increases in recent decades due to the change on technologies. A considerable number of information systems are thus built for efficient production and management. As a result, a large number of operations and data are generated. The internal IT unit must have the ability to process the large amount of data, provide different services for each kinds of users,...
Recently Lu et al. proposed a modified anonymous two-factor authenticated key exchange protocol to eliminate the security weaknesses of Xie et al.'s scheme. They hence claimed that their scheme is immune to possible well-known attacks. However, we found that Lu et al.'s protocol is still insecure against the outsider attack, user impersonation attack, and off-line password guessing attack. To overcome...
ERP application performance can be complicated, as it's ought to satisfy the prerequisite and desires of some of the greatest and most refined enterprises inside the world. Odoo is in vogue ERP application comes into picture, Odoo-ORM framework written in python. This paper concentrates on essential component of Odoo-ORM i.e. caching. Caching can be one of the important parts of an ORM application...
In modern world, due to enormous demand for the cloud storage there are high chances of data duplication. Hence, redundancy create problem by increasing storage space and so storage cost. Inline Deduplication used to check duplicity before uploading data. Sometimes while restoring data failures or corrupting data can heavily create problem for users. Erasure coding can be used to encoding and storing...
The long-term and real-time recording and analysis of a patient's heart rate can be helpful for medical staff to estimate a patient's prognosis. The long-term trends of various heart rate variability (HRV) parameters of a patient's condition may indicate disease development. In some cases, it may be used as feedback for providing suitable medical treatment. Because of the long-term purpose of recording...
Authentication is the first step to access a resource (service, website, data, etc.), so it is of vital importance in a system. The most widely used authentication mechanisms are one-factor authentication based on password and two-factor authentication methods which require a password and another factor (verification code, biometric feature, hardware token, software plug-in, etc.). However, in many...
"Proxies" are Internet applications that enable Internet users to connect to (or tunnel through) remote resources using another machine for two distinct purposes. First, they allow users to access remotely all resources in a network (i.e. Virtual Private Network or VPN). Second, they bring some level of anonymity by bouncing traffic around proxies. The latter model may enable Internet users...
Saving power becomes one of the main objectives in information technology industry and research. Companies consume a lot of money in the shape of power consuming. Virtual Desktop Infrastructure (VDI) is a new shape of delivering operating systems remotely. Operating systems are executing in a cloud data center. Users desktops and applications can be accessed by using thin client devices. Thin client...
Data deduplication is a technique that removes redundancy of data on the storage. For cloud storage services, enabling deduplication over encrypted data is of vital importance to achieve both cost savings and keeping data confidentiality simultaneously. Recently proposed solutions are not sufficient because of lacking desired level of security and efficiency. In this paper, we propose SEED, a novel...
We study the dynamic energy optimization problem in data centers. We formulate and solve the following offline problem: given a set of jobs to process, where the jobs are characterized by arrival instances, required processing time, and completion deadlines, and given the energy requirements of switching servers ON or OFF, in which time-slot which server has to be assigned to which job, and in which...
The tracking of the activities of daily living (ADL) may have significant implications in healthcare because it would enable healthcare professionals to receive updates remotely regarding the functional status of post-injury and post-surgery patients, and people with disabilities and the elderly. If successful, technologies that enable ADL tracking could dramatically reduce the healthcare cost because...
Recently, Wu et al. introduced a general approach based on distributed computing named Job-Level (JL) Computing. JL Computing has been successfully used to construct the opening books of game-playing programs.? In order to support large-scale computing problems such as solving 7×7 killall-Go, or building opening books for 9×9 Go or Connect6, record databases are used to store JL computing results...
When private data or sensitive information is stored in the database, a typical way to protect the data is to encrypt the data before storing it. For efficiently retrieving the data, an effective search mechanism is needed that works over the encrypted data smoothly. When data is encrypted the performance of querying the database is degraded. In this paper we are going through the various search techniques...
The main contribution of this paper is to show an implementation of the parallel convex hull algorithm on the Parallella architecture. Parallella is a single-board computer with 16 mesh-connected cores. We have considered the memory architecture and mesh-connected network of the Parallella architecture. We evaluated the computing time and the energy-efficiency by comparing with various computing platforms...
The incorporation of peer code reviews as being part of a developer's work flow, and hence the software development lifecycle, has steadily grown in popularity over the past three decades. During the process of statically inspecting code, developers of a codebase are able to collaboratively detect possible code defects, as well as use code reviews as a means of transferring knowledge to improve the...
HTTP is recognized as the most widely used protocol on the Internet when development of applications is transferred more and more onto the web. Therefore, malicious developers trend to exploit HTTP as a communication media environment to spread forbidden actions. Detection of malicious HTTP communication is a really huge challenging job since the malicious HTTP communication is transparently merged...
In the preceding few years the security of databases is a challenging and multifarious issue for enterprises. As a matter of fact, databases are the premier targeted system in any corporation that holds confidential information, or its businesses' relies heavily on the data and its integrity and availability. Vulnerability in network and internet links to databases may trigger obscure things even...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.