The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the continuous development of the space technology, increasing communication between spacecrafts. To ensure the spacecrafts keep a uniform time standard, time synchronization protocol plays an crucial role. Taking account the characteristics of deep-space: poor link quality, limited node computing power, and the GNSS service is unstable, through the improving of IEEE1588 protocol, a autonomous...
In traditional campus network, application-layer classification is often achieved by using specific devices that support application-layer classification. Since different vendors have different realizations, even the same flow may have different results with different devices. Thus it's hard to set a global consistent application-layer management policy for the whole network. The idea of separating...
Informative gene selection is an important topic in the field of bioinformatics which has attracted intensive interest in recent years. It aims to identify the genes which are differentially expressed in different groups, and thus are informative for the classification between the groups. For this purpose, many micro array experiments have been conducted by various medical institutes on their own...
Many important network security areas, such as Intrusion Detection System and Next-Generation Firewall, leverage Traffic Classification techniques to reveal application-level protocols. Machine Learning algorithms give us the ability to identify encrypted or complicated traffic. However, classification accuracies of Machine Learning algorithms are always facing challenges and doubts in practical usage...
The purpose of this article is to describe characteristics of obfuscated network buffer overflow attacks in contrast with characteristics of directly simulated attacks. The obfuscation was performed by tunneling of malicious traffic in HTTP and HTTPS protocols. These protocols wrap a malicious communication between an attacker situated outside of an intranet and a callback located inside of an intranet...
Spam is a problem that refuses to go away. An immense amount of time and money is currently devoted to hiding spam, but not enough is devoted to effectively preventing it. CAPTCHAs are a prevalent spam prevention mechanism, but are getting harder for humans to solve and easier for programs to "break". CAPTCHAs also cannot prevent spam from hijacked accounts since they are mostly used during...
In RFID-enabled applications, we may pay more attention to key tags instead of all tags. This paper studies the problem of key tag counting, which aims at estimating how many key tags in a given set exist in the current RFID system. Previous work is slow to solve this new problem because of the serious interference replies from the large number of ordinary (i.e., Nonkey) tags. However, time-efficiency...
Botnets, as one of the most formidable cyber security threats, are becoming more sophisticated and resistant to detection. In spite of specific behaviors each botnet has, there exist adequate similarities inside each botnet that separate its behavior from benign traffic. Several botnet detection systems have been proposed based on these similarities. However, offering a solution for differentiating...
Delay is one of the main parameters in determining quality of service and topology of network. One way delay provides us with more information than that a round trip time does and it also involves more intricate calculations. In this paper, two measuring devices are designed and implemented that can measure the one way delay present between two distant points in web environment using GPS clock and...
Automating functional size measurement (FSM) is important for organizations needing to measure a large number of projects within a short timeframe, provided, of course, that the results automatically generated are accurate, particularly when such measurement is based on an international measurement standard. A literature review has shown that very little work has been conducted on verifying measurement...
In this paper we introduce CrowdSource, a statistical natural language processing system designed to make rapid inferences about malware functionality based on printable character strings extracted from malware binaries. CrowdSource “learns” a mapping between low-level language and high-level software functionality by leveraging millions of web technical documents from StackExchange, a popular network...
We asset about the analysis of electrical appliance consumption signatures for the identification task. We apply Hidden Markov Models to appliance signatures for the identification of their category and of the most probable sequence of states. The electrical signatures are measured at low frequency (10−1 Hz) and are sourced from a specific database. We follow two predefined protocols for providing...
Software defined infrastructure greatly reduces the deployment cost of distributed applications. Many distributed applications employ message oriented middleware (MOM) for the integration of heterogeneous components and to achieve scalability and fault tolerance. The structure of a distributed application can be very complex. In addition, the asynchronous message delivery model of MOM further complicates...
Research focus in face recognition has shifted towards recognition of faces “in the wild” for both still images and videos which are captured in unconstrained imaging environments and without user cooperation. Due to confounding factors of pose, illumination, and expression, as well as occlusion and low resolution, current face recognition systems deployed in forensic and security applications operate...
In order to reduce the cost and acquire the microsecond-level time synchronization, this paper has proposed the DF-NTP (Double filter NTP) and analyzed the algorithm of NTP (network time protocol) and the causes of synchronization error. The precision of time synchronization can be raised through filtrating the delay in the forward-backward path and reducing the influence of uncertain delay. The experimental...
As underwater acoustic network technologies become relatively mature, several protocol stack frameworks have been proposed and implemented. However, it is still an open problem to evaluate protocol stack frameworks. To evaluate their performance and help users to choose a proper solution, we propose several performance criteria, namely, timing accuracy, memory usage, power consumption, learning curve,...
Efficient and accurate network simulation techniques are critical for evaluating protocols and systems at scale. For example, the magnitude of modern data center deployments requires the use of fast simulation techniques in order to evaluate newly proposed algorithms and system architectures. Unfortunately, efficient simulation can come at the cost of accuracy and realism. In this work-in-progress...
Safety applications have been popular research topics in recent years, such as forward collision warning, emergency electronic brake lights and intersection collision warning. The basic safety message is used to broadcast from each car that transmits the position, car speed and car heading information. Neighbourhood cars receiving this information can decide on the danger or not in the next second...
Localization and tracking of players is crucial for monitoring both indoor and outdoor sports activities. The effects of the environment pose a major challenge for an accurate position estimation. In this paper, we present a novel solution based on the received signal strength indication (RSSI) feature provided by off-the-shelf wireless networks. Trilateration is used for estimating the position of...
In the field of robotic rehabilitation, surface electromyography (sEMG) has been proposed for controlling exoskeleton device for assisting different movements of the human joints, such as the shoulder, the elbow, the wrist and the fingers. However, few works have been proposed for using sEMG to control a forearm exoskeleton for assisting the movement of pronation and supination. The main difficulty...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.