The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Users of computer systems wish to keep their personal data safe, updated, fair and accessible by other terminals, like personal computers, smart phones, portable consoles and PDAs. To perform these activities, one technology has become popular in our daily lives: data synchronization. Companies that provide this kind of service must do it with the greatest availability possible since their clients...
The MPT network layer multipath communication library-which was proposed to be a possible new basis for the future cognitive info-communication-is capable to use multiple communication channels to create an UDP tunnel which uses GRE tunnel protocol. On the other hand, Multipath TCP uses a special kernel module which creates multiple TCP sub-flows to aggregate network throughput. In this paper we used...
In this paper, we implement a video effect process allocation scheme for Internet live broadcasting. Recently, Internet live broadcasting services have widely spread. In the Internet live broadcasting services, users add special effects to videos in real time. However, a delay occurs to process and broadcast videos because of the poor performances of users' devices. Therefore, we have proposed a method...
In cloud computing, multiple servers are consolidated into a physical machine in order to reduce the cost of deploying the servers. Guaranteeing the service level objective (SLO) of each server is one of the most important factors in a virtualization system. Particularly, isolating the I/O resources among VMs competing for a shared storage system is challenging. Recently, use of flash based Solid...
Recent computer systems research has proposed using redundant requests to reduce latency. The idea is to replicate a request so that it joins the queue at multiple servers. The request is considered complete as soon as any one copy of the request completes. Redundancy is beneficial because it allows us to overcome server-side variability – the fact that the server we choose might be temporarily slow...
This paper deals with the design principles and implementation of a reconfigurable real-time software platform designed for data exchange between software modules of unmanned underwater and surface vehicles. The aim of developing a new robotic platform was the realization of a light-weight OS-independent library that allows integrating AUVs, ROVs and surface vehicles to a single computing cluster...
In this work, a serious game is presented to sensitize young people to stigma in mental health. This a video game, developed by a multidisciplinary team (computer scientists, psychologists, psychiatrists and educators), features characters that have different mental disorders. It provides different information about what mental illness is while the player interacts with the characters in different...
Being DNS an essential service for Internet reliability, it is an attractive target for malicious users. The constantly increasing Internet traffic rate challenges DNS services and their attack detection methods to handle actual queries while being flooded by tens of millions of malicious requests per second. Moreover, state of the art on hostile actions evolve fast. DNS administrators continuously...
When dealing with eventually consistent systems, application developers are often required to write their own conflict resolution algorithms. The aim of this work is to provide an abstraction layer for an eventually consistent database, namely CouchDB, and its client side implementation, PouchDB in a manner which makes it easier for software developers to use. This is achieved through a JavaScript...
As the Internet of Things evolves, many devices that were not previously considered suitable for this trend can now be used as a part of smart interconnected systems. This paper describes the process of adapting a Cisco IR829GW router to be used as both a Cisco IOS platform (for complex networking needs) and an embedded device running Yocto Linux distribution for Internet of Things application deployment...
The paper presents a test bed platform for implementation of Cloud Computing in SCADA systems for Electrical Power Systems. The general idea of the experimental study is to complete operation tests of traditional SCADA systems on cloud computing platforms, and integrate the main application modules of SCADA systems for electrical power metering on the cloud platforms. The logical networking structure...
Network data is ubiquitous in cyber-security applications. Accurately modelling such data allows discovery of anomalous edges, subgraphs or paths, and is key to many signature-free cyber-security analytics. We present a recurring property of graphs originating from cyber-security applications, often considered a ‘corner case’ in the main literature on network data analysis, that greatly affects the...
Currently, cloud computing offers flexible, dynamic and cost effective computing outsourcing, but it limits these economic and operational benefits to non real-time and non safety-critical systems. This is because of the lack of alternative control, supported by current cloud infrastructures, in case of a broken cloud link. While steps have been taken in using cloud infrastructures for soft real-time...
The paper present a Dynamic Service Discovery System[1] with a Priority Load Balance Strategy. The system not only integrates Zookeeper[2] and tradition web project written with Spring and SpringMVC to achieve the dynamic service discovery function, which feeds the basic needs of the Priority Load Balance Strategy. The experimental test result shows that the new system has lots of advantages over...
Today Peer-To-Peer (P2P) networks are becoming more important from high scalability and low cost point of view, and these networks are popular platform for video streaming. With burgeoning of P2P networks, one of the interesting areas of research is confronting to various attacks and threats against these networks. Since, video streaming is a popular application of P2P networks, some attacks like...
We present the lowest-path cost to destination scheme for identification of the most suitable node for data caching. The scheme identifies the network node that yields the lowest-cost path for delivering data to demanding users. This scheme is applied to information centric networks (ICN) that consider two different data consumption modes: frequently and sporadically. We consider the use of Software-Defined...
Nowadays, the attacks are no longer performed from a single computer but from thousands, sometimes millions of systems that are located all over the globe and are grouped in a network called botnet. The most widely used technique to control a botnet is to try to connect to many domain names, generated according to an algorithm called domain generating algorithm (DGA). In this paper we present different...
Attacks of Ransomware are increasing, this form of malware bypasses many technical solutions by leveraging social engineering methods. This means established methods of perimeter defence need to be supplemented with additional systems. Honeypots are bogus computer resources deployed by network administrators to act as decoy computers and detect any illicit access. This study investigated whether a...
It was long time ago, when the Internet was a basic network used for data and information sharing. The evolutionary process of the Internet started with connecting people and then with the increasing popularity of it and with the emerging concept of smart systems, device-to-device communications within smart systems dawned. And now; by taking the advantage of another emerging concept: mobility, we...
Now a days many people are doing online financial transactions. This transaction needs to be secure. There are various attacks present behind this. Phishing is one type of attack. For detecting this attack, various anti-phishing mechanisms are used. In phishing process, suppose cheater sends out thousands of phishing emails with a link to the fake website. Victims click on links in email believing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.