The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses the design, development and implementation of an cross-platform program, called ENDS (Easy Network Designer Software), which allows to perform network virtualization and remote configuration of MikroTik equipment basic parameters through a graphical interface. The software was written in Java and it uses a MySQL database where the projects are saved. The program was tested by...
In this paper, we consider a binary parallel composition of FSMs (that are probably partial) and discuss how to check whether this composition is safe or not, i.e. in fact, we check whether there are no deadlocks and livelocks in the composition. We propose a technique for checking this property step-by-step: at the first step we analyze the components separately, at the second step we build the global...
This paper overviews a technique for verifying cache coherence protocols described in the Promela language. The approach is comprised of the following steps. First, a model written for a certain configuration of the memory system is generalized to the model being parameterized with the number of processors. Second, the parameterized model is abstracted from the exact number of processors. Finally,...
The MPT network layer multipath communication library-which was proposed to be a possible new basis for the future cognitive info-communication-is capable to use multiple communication channels to create an UDP tunnel which uses GRE tunnel protocol. On the other hand, Multipath TCP uses a special kernel module which creates multiple TCP sub-flows to aggregate network throughput. In this paper we used...
We present TerrainLOS, an outdoor propagation model that uses Digital Elevation Models to determine whether two nodes can communicate. We have implemented TerrainLOS in the sensor network simulator COOJA and used it to evaluate how the roughness of terrain, which we classify using Average Cumulative Visibility, affects the number of edges, connectedness, latency, and power of a network. We compare...
This paper deals with the design principles and implementation of a reconfigurable real-time software platform designed for data exchange between software modules of unmanned underwater and surface vehicles. The aim of developing a new robotic platform was the realization of a light-weight OS-independent library that allows integrating AUVs, ROVs and surface vehicles to a single computing cluster...
Randomized controlled trials (RCTs) are the gold standard for scientific research but pose many obstacles for game- based learning (GBL) studies. This poster is intended to foster a discussion about RCTs by summarizing two recent trials performed by the authors and comparing the distinctly different protocols including length of stimulus exposure, levels of internal and external validity, and sample...
The exponential nature of the technological progress, along with the need for smaller and mobile computers led to the emergence of embedded devices like Raspberry Pi or Beaglebone Black. The main difficulty in using these embedded devices is that the device must be physically connected to a regular computer in order to be programmed to do useful work. This thesis presents a platform named Wyliodrin...
This paper describes the design and implementation of a natural sensor-based interface intended for 3D graphics software packages and virtual reality (VR) environments. The interface operates through natural pointing gestures and replaces the conventional pointing devices which are usually used to interact with such software environments. It is implemented on the basis of the motion capturing sensor...
Web-based service-oriented grid computing refers to a distributed computing system comprising a collection of interconnected and virtual computers that provides web-based services via the Internet. These services are based on Service Level Agreements (SLAs) established by negotiation between service providers and consumers. SLAs are contractual obligations that define the mutually agreed understandings...
After decades of using technology as a mean to synthesize new digital worlds, we've finally achieved such computational power that we are now able to provide major detail to most elements in any creation. Video game consoles, for instance, are capable of rendering multiple data layers that are used by developers in order to provide a credible universe for the player to get immersed into. On the other...
The flipped classroom reconstructs the learning process of the students. In view of the reflection problems of flipped classroom based on small private online course (SPOC), this paper takes the course “Network Technology and Application” in engineering colleges as an example to explain the implementation process of the flipped classroom, which proposes flipped classroom teaching practice process...
Network security management is a big challenge for network administrators due to increasing vulnerabilities. Vulnerabilities are the weakness of the network and allow malicious attackers access to resources controlled by an organization. To keep networks secure network administrators should be aware of all vulnerabilities through which an attacker can gain access. In this paper, we have considered...
Paxos is regarded as one of the most important protocols for distributed consensus in the presence of failures. It uses a number of 2f+1 processes to tolerate the benign failure of f processes, by splitting them into different roles with tailored tasks. The protocol presents multiple engineering challenges, two of which are pinpointing the cause for stalling and identifying the faulty processes. In...
Movement Related Cortical Potentials (MRCP) have been the subject of numerous studies. They accompany many self-initiated movements and this makes them a good candidate for incorporation in BCI paradigms. In this work we propose a novel experimental protocol involving natural controlling of a computer mouse and based on EEG recordings from 5 subjects, show that it elicits MRCP. We also show the feasibility...
Postural instability affects a large number of people and can compromise even simple activities of the daily routine. Therapies for balance training can strongly benefit from auxiliary devices specially designed for this purpose. In this paper, we present a system for balance training that uses the metaphor of a game, what contributes to the motivation and engagement of the patients during a treatment...
Low-power embedded platforms are widely used in various data collection scenarios to capture physical world phenomena in micro-scale. Given that many applications require long operation times, it is important for nodes to employ various schemes to maximize their lifetime. Within the sensor network research community, schemes such as low-power listening (LPL) and low-power probing (LPP) have been actively...
With the development of semiconductor technology and many-core processors, many-core processors has gradually become mainstream and a hot topic in the field of computer science. With the development of network and all kinds of network applications, the number of network data presents explosive growth, how to achieve the rapid processing of network data has been a problem to be solved. Aimed to resolve...
With the increase in Man-in-the-Middle (MITM) attacks capable of breaking Hypertext Transfer Protocol Secure (HTTPS) over the past five years, researchers tasked with the improvement of HTTPS must understand each attacks characteristics. However with the large amount of attacks it is difficult to discern attack differences, with out any existing classification system capable of classifying these attacks...
This paper proposes an online cake-cutting protocol without a long wait. Cake-cutting protocols are used to fairly divide a heterogeneous divisible good among some number of people. Though many protocols have been proposed, most of them assume that all people must simultaneously execute one protocol. Walsh proposed an online cake-cutting protocol, in which each player can join to the protocol at any...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.