The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices carry a number of vulnerabilities that, when exploited, can result in proprietary-data leakage, data alteration, fraudulent transactions and, in extreme cases, physical damage to the user and surroundings. Such attacks can be instigated by both outsiders and insiders, and can leverage vulnerabilities embedded in the hardware and software components of the device, as well as risky behavioral...
Intel's SGX secure execution technology allows running computations on secret data using untrusted servers. While recent work showed how to port applications and large-scale computations to run under SGX, the performance implications of using the technology remains an open question. We present the first comprehensive quantitative study to evaluate the performance of SGX. We show that straightforward...
Deep Neural Networks (DNNs) have demonstrated state-of-the-art performance on a broad range of tasks involving natural language, speech, image, and video processing, and are deployed in many real world applications. However, DNNs impose significant computational challenges owing to the complexity of the networks and the amount of data they process, both of which are projected to grow in the future...
The proliferating usage of cloud environments to store databases poses new challenges. Traditional encryption protects the user's data privacy, but prevents the server from executing computations on behalf of the user (client). By contrast, Partially Homomorphic Encryption schemes, such as the Paillier cryptosystem, facilitate some server queries but involve heavy computations that make them relatively...
In this paper, we elucidate the main performance bottleneck in realizing packet processing which require carrier-scale huge tables to lookup (carrier-scale packet processing) on top of general-purpose servers. Our experimental quantitative analysis using DPDK-Click based packet processing model reveals that performance degradation of the carrier-scale packet processing is mainly caused by increased...
Internet security is a branch of computer sciences often involving browser security, network security, applications and operating systems to keep the internet as a secure channel to exchange information by reducing the risk and attacks. There are a number of studies that have been conducted in this field resulting in the development of various security models to achieve internet security. However,...
Recently, network virtualization technology (NFV) is being studied to reduce network operation cost, mainly in telco companies. Network virtualization technology is a technology that enables software control by abstracting computing, server, and network functions that were formerly hardware-oriented. Network virtualization technology provides the opportunity for small and medium enterprises with technology...
In this work, a structure of the controller for registering passenger flow (CRPF) of public transport for the “smart” city system was designed. Controller operation based on the use of cheap mini-computer Raspberry Pi. Structural model of the controller was built with using the method of simulation by Petri nets. Software and hardware for controller was developed, the particular implementation of...
There is a spectrum of solutions are available for distributing content over the Internet today. One of these solutions is Content distribution networks (CDN). CDN need to make decisions, such as server selection and routing, to improve a performance of content distribution. But we must remember, that performance may be limited by various factors such as packet loss in the network, a small receive...
Virtualization is one of the important key technologies in cloud computing. Main advantages include maximum resource utilization and high flexibility. The virtualization technology offers different services to users and the vendors and has become an upcoming technology in the IT (Information Technology) industry. This article explores various network virtualization technologies using cloud computing...
The Internet of Things (IoT) technology, based on the wireless sensor network, is developing rapidly and permeating into agriculture including livestock farming. Our research focuses on the problem that current industrial IoT system for livestock farming is tightly coupled, hard to expand, and with poor network performance. In this paper we proposed an integrated framework of smart livestock farming...
In networks like Combat ship data network, the Ethernet is required to provide fault tolerance to all of its constituents for smooth operations. The analysis in this paper is done on the basis of our already proposed scheme Recursive Scalable Autonomous Fault tolerant Ethernet. Where, the large-scale network is divided into small subnets by limiting the number of nodes in each. The nodes in RSAFE...
With the explosive growth of data capacity, large enterprises increasingly rely on business information systems. A highly informational and data-centralized grid company that engages in high-frequency businesses will face major business failures, incalculable impacts and irreparable damages once data errors occur. The development of an effective high-availability information system has become a hot...
Providing practical experience to the students in the latest technological innovations is of prime importance, which is limited because of lack of state of the art lab facilities in many engineering institutes. A solution to this problem is Virtual Labs which provide access to costly lab equipment to the student community via internet without the need for their physical presence. This paper presents...
Virtualization is an important technology in data center environment due to its useful features such as server consolidation, power saving, live migration and faster server provisioning. However, virtualization sometimes incurs some performance loss. There are many virtualization approaches including full virtualization and operating system-level virtualization. Different virtualization platforms...
The purpose of the research is to make a unique drone which is capable to move autonomously through any environment by interacting with server by itself. The main uniqueness is that it can move through air, land and water. Nowadays various drones are seem to be available. But such a drone which can move through every environment is never seen before. The main motive is to get accuracy in rescue missions...
Building a big data processing cluster needs extra care on selecting right storage device, Operating System(OS) and their configuration. A wrong strategy may lead to a very slow cluster which becomes inefficient to processing data in considerable amount of time. In this work we will show how the performance varies with different setup using Hadoop Distributed File System(HDFS) and related tools.
It has been observed that there has been a great interest in computing experiments which has been useful on shared nothing computers and commodity machines. We need multiple systems running in parallel working closely together towards the same goal. Frequently it has been experienced and observed that the distributed execution engine named MapReduce handles the primary input-output workload for such...
Big data and machine learning are rapidly developing fields with evolving and increasingly diverse hardware requirements. The goal of this project was to demonstrate that an enterprise-ready, Warewulf-based HPC compute cluster could support heterogeneous hardware via the integration of a GPU compute server. The benefits of this were two-fold. First, the integration of the GPU compute server into the...
Network Function Virtualization along with Network Service Chaining envision a reduction in the respective cost that end users, service providers, and network operators are experiencing, while providing complete and high quality services. However, the vast range of available services and the service on-demand model, creates dynamic traffic conditions that necessitates a flexible and automatic network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.