The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Strict Priority Queuing (SPQ) is a widely used queuing method for applying preferential service on edge networks. SPQ, in presence of persistent high priority traffic, is known to behave in a very hostile manner toward low priority flows, causing them to experience poor TCP performance. This often leads to substantial packet losses, which consequently results in aggressive reduction in the congestion...
The security of industrial control systems has been a big topic by the Stuxnet case in 2010. As a solution which can solve these requirements, data diode has emerged. A data diode is a computer security device that restricts the communication along a network connection between two computers so that data can only be transmitted in one direction. This enables a more sensitive or highly classified computer...
Today internet has become easily accessible which allows the user to perform multiple tasks such as access information, do study, make friends, online shopping, search for anything they want and many more. Similarly people do use internet to know the better options and find out relevant alternatives of product, services, places like wise. But searching for better choices may become frustrating and...
This paper presents a proposed approach called VAIL System Call Monitor (VSCM) to detect and thwart previously unknown code injection attacks. The idea is based on the fact that any process needs to correctly invoke CreateProcess() system calls, otherwise child-process creation will fail. VSCM intercepts and verifies CreateProcess() system call invocations from a monitored process. In case an unknown...
According to the development status of reconfigurable computing specially its applications and advantages in the domain of aviation and spaceflight, this paper makes a research in the availability of reconfigurable computing. Through three aspects, reconfigurable chip, development tool and compilation technology, this paper analyses the obstacles reconfigurable computing faced with. In the end, this...
Enterprise Resource Planning (ERF) systems are sophisticated information database that provide an automatic cross-functional business processes. An ERP user, however, often encounters challenges using complex ERP interfaces. Educational ERP implementation has been plagued with failure, but it to be adopted and is expanding in Indian higher education. An AICTE, UGC and others government approving bodies...
Nowadays the technology is improving in a fast pace and the service sector is getting widely boomed. Consumers who are giving prior importance to quality consider several factors for choosing the service. Among them the service rendered by academic libraries also matter a lot because of the growth of digital libraries. The objective of this paper is to find factors which are more important for assuring...
Software piracy worldwide has resulted in serious industrial, academic and economic consequences. However, the problem can be solved if the root causes can be identified. Personality traits are said to be an effective positive influence on unethical behaviour. For this reason, personality traits could be a predictor for software piracy. This study investigates personality traits as a factor in students...
An improvement of IEC-61123 in the field of sequential probability ratio test (SPRT) is proposed. The current standard does not provide a proper solution for modern industry's needs, and the test plans are not up-to-date with the knowledge in the area of sequential tests. The advantages of the proposed version are reflected by the efficacy and accuracy of the tests, the wider range of the ready to...
In recent years, military computers have been widely used by ASELSAN. Flexible backplanes which have backplane connectors on one end (VPX or CPCI) and military connectors on the other end are used as part of the military computers along with processor boards, Input/Output boards, communication boards etc. To meet the requirements of various projects, backplanes with different form factors (3U, 6U...
Spectrum sensing is the key enabling technology for cognitive radio networks. The main objective of spectrum sensing is to provide more spectrum access opportunities to cognitive radio users without interfering with the operations of the licensed network. Spectrum sensing decisions can lead to erroneous sensing due to fading, shadowing and other interferences caused by either terrain inconsistency...
Nowadays, with the rapid development of distributed computing, message distribution has been more and more important to distributed systems. Kafka was developed to collect and distribute massive messages for distributed systems. It is a high-throughput distributed messaging system. Kafka can always keep stable performance even if it processes millions of messages per second. Messages are persistent...
The replacement of DRAM with non-volatile memory relies on solutions to resolve the wear leveling and slow write problems. Different from the past work in compiler-assisted optimization or joint DRAM-PCM management strategies, we explore a light-weighted software-controlled DRAM cache design for the non-volatile-memory-based main memory. The run-time overheads in the management of the DRAM cache is...
A major concern of users of cloud storage services is the lost of control over security, availability and privacy of their files. That is partially addressed by end-to-end encryption techniques. However, most of the solutions currently available offer rigid functionalities that cannot be rapidly integrated into customized tools to meet user's requirements like, for example, file sharing with other...
Service resiliency is crucial to the operation of global-scale cloud applications with fine-grained replication (FGR). If poorly designed, a few disruptions may cause cascading failures or severely impair the level of service. Due to high complexity of FGR configuration problem, existing techniques usually rely on over-provisioning and static replica configuration to achieve reliability to a certain...
During the past ten years, cloud computing gradually becomes mature which is a current research hotspot. OpenStack is currently one of the most popular open source cloud platforms that developed by Rack space and NASA. It provides some toolkits to deploy cloud environment and implement cloud infrastructure like Amazon EC2. In this paper, we describe OpenStack architecture in detail and introduce its...
e-Learning is a highly developing field in modern education. It provides many different possibilities for studying and assessment of learning outcomes. However, a problem of developing highly reliable identification methods for assessment procedures is still an important issue. This paper presents the results of our review of identification methods currently realized in various e-learning systems...
The increasing number of people using social media to express their personal experiences has led to an emerging interest in supporting social media analysis for marketing, opinion analysis and understanding community cohesion. Social customer relationship management (SCRM) systems have become an interesting research area. Generally analysis needs to be done on large volumes of data (Big Data) in an...
In spite of the advances in today's technologies, most disasters are hard to predict and prevent. Disaster management to reduce damages and losses is particularly important. Computations to predict the effect of an impending or prevailing disaster, i.e. urgent computing, can support civil protection services to make informed decisions that can improve the efficiency of mitigation activities and reduce...
Nowadays, more and more people are using Information and Communication Technologies (ICTs) in order to accommodate their daily needs. E-Government (e-Gov) adopts these technologies in an effort to provide prompt and secure services to citizens. However, the intention to use e-Government services has not yet been fully examined by the international literature. The present research attempts to bridge...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.