The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Application layer Distributed Denial of Service (DDoS) attacks, which are legitimate in packets and protocols, gradually become a pressing problem to the current network. How to effectively resist this type of attack is becoming even more challenging with the vast resources and techniques increasingly available to attackers. This paper studies the existing application layer DDoS attacks and provides...
A challenge in designing a peer-to-peer (P2P) system is to ensure that the system is able to tolerate selfish nodes that strategically deviate from their specification whenever doing so is convenient. In this paper, we propose RACOON, a framework for the design of P2P systems that are resilient to selfish behaviours. While most existing solutions target specific systems or types of selfishness, RACOON...
The delineation of well capture zones is of great importance to accurately define well head protection area (WHPA) for potential groundwater resources and the public security. Natural aquifer systems typically involve different extent of heterogeneity in aquifer parameters and such parameter variations can directly influence the estimations of flow fields and the delineations of WHPAs. This study...
In the last decades, along with the continuously evolving of the Internet Protocol-based network, numerous Internet programs that have played critical roles in the current technological era are being developed inclusive of interactive applications. Nevertheless, the transmission performance and user experience of these instant services that require high bandwidth or low latency may suffer when serious...
Phasor measurement unit has became important tools to give the dynamic condition of electrical power system. The technology of the measurement is growing rapidly but the use of the measurement is still infancy. This paper discusses an experience of design and implementation intranet telecommunications framework for phasor measurement units (PMU) optimized for use on wide area networks. Traditional...
Deep packet inspection (DPI) technology has conventionally been introduced for traffic monitoring, bandwidth control, bandwidth allocation, access control of specific types of traffic, etc. By installing a DPI equipment at any arbitrary point in a network, it is possible to monitor communications of many servers simply and this could simplify dramatically the conventional work load for system management...
A dominant trend nowadays is the rapid spread of small devices, such as laptops and smartphones, carried by people. The users' need for applications with local high-bandwidth requirements and due to limited wireless Internet access, a challenge if identified which is critical for the success of applications such as local wireless data synchronization, gaming or communication. Opportunistic networks...
With the introduction of Dynamic voltage/ frequency scaling (DVFS), the supply voltage to the various components on System-on-Chip (SoC) can be controlled depending on system load to track power-performance curve for best possible efficiency. Although dynamic power management solutions like DVFS for CPU and GPU are quite common and implemented in almost every embedded device, unfortunately the same...
Spectrum measurements are a crucial element of compliance enforcement in dynamic spectrum access (DSA) networks and for emerging interference limit policies such as harm claim thresholds. Such measurements should provide better spatio-temporal resolution than traditional compliance enforcement approaches for characterisation of spectrum usage. Using current techniques, even in distributed monitoring...
Recentlly, NUMA(Non-Uniform Memory Access) multicore platform becomes more and more popular which provides hardware level support for many hot fields, such as cloud computing and big data, and deploying virtual machines on NUMA is a key technology. However, performance degradation in virtual machine isn't negligible due to the fact that guest OS has little or inaccurate knowledge about the underlying...
Wireless Avionics Intra-Communication (WAIC) is the future avionics communications, which will substitute wire communication in a single aircraft. The WAIC systems do not provide any communication between air-to ground, air-to-air, and air to satellite. The WAIC systems are designed solely for enhancing efficiency and reliability inside the aircraft. The purposes of the system are monitoring, controlling,...
Since the minimum variance controller (MVC) provides the smallest achievable output variance, performance indices based on minimum variance benchmarking have been applied extensively to both univariate and multivariate systems. This paper extends the idea of minimum variance benchmarking to the performance monitoring of cross-directional (CD) processes in paper machines. A performance index is proposed...
Regardless of Tor's robustness against individual attackers thanks to its distributed characteristics, the network is still highly vulnerable to those very powerful adversaries, such as oppressive regimes which have control over a large proportion of the Internet. As recently confirmed by Edward Snowden, Autonomous-System level adversary is no longer theoretical, but poses a real danger to the Tor...
Most of the network monitor systems use a user-level network capture library. The user-level library incurs a large overhead and provides inaccurate and insufficient information for self-adaptive networks. For these reasons, we develop a lightweight built-in network monitor running at Linux kernel level for self-adaptive IoT devices.
The adoption of on-load tap changer (OLTC)-fitted transformers in low voltage (LV) networks is increasingly being considered to mitigate voltage issues resulting from high penetrations of photovoltaic (PV) systems. However, depending on the corresponding voltage control strategy, tap operations can be significant, accelerating the ageing of the OLTC. This work assesses the performance of different...
We discuss OSNR monitoring using low bandwidth Stokes parameter analysis. OSNR levels reaching 23 dB are experimentally estimated within ±1 dB. Simulations show resilience to chromatic dispersion, corresponding to 1000 km of SMF for the experimental setup.
This paper proposes an intelligent gateway system for SCADA networks to avoid DOS attacks. The proposed approach provides details about an SIG system architecture which establishes the connection between Master SIGs and Perimeter SIGs, the traffic flow, major alerts, and minor alerts. Simulation experiments are an indispensable phase to analyze and assess the security of SCADA (Supervisory Control...
One advantage of content-centric networking lies in its built-in support for multipath forwarding. In this paper, we propose a multipath forwarding strategy in order to fully utilize available bandwidth in a content-centric network. Using the proposed strategy, each intermediate router sensibly adjusts the amount of traffic forwarded over a given face (among a set of faces) associated with a content...
This paper presents a three-channel frontend system for fetal monitoring applications which includes three amplification chains, an ADC and all power management circuitry needed to feed the different building blocks from a single 1.4V supply. The specifications of the proposed system (0.38μVrms equivalent input noise, 74.5dB dynamic range and 0.5 to 200Hz signal bandwidth) are determined according...
The Information Centric Networking (ICN) model relies on the ubiquitous use of caching to improve performance and reduce bandwidth requirements. ICN also makes it possible for routers to fetch content from downstream nodes, such as when a content for a home user is fetched from a neighbor’s home router, with significant performance improvement. This paper shows how an attacker using compromised hosts...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.