The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We try to reconfirm whether the previous findings of online consumer behavior research are consistent with the findings of the current study when we apply Big Data technique to evaluate the same online behaviors mentioned in prior studies. The results indicated that different research methods (e.g., web analytics, online survey) do actually lead to different research findings even though the same...
We propose an implementation of a secured content addressable memory (SCAM) based on homomorphic encryption (HE), where HE is used to compute the word matching function without the processor knowing what is being searched and the result of matching. By exploiting the shallow logic structure (XNOR followed by AND) of content addressable memory (CAM), we show that SCAM can be implemented with only additive...
Internet of Things is a connected ecosystem where everyday objects have network connectivity allowing them to do data transfers. This scenario often involves a gateway for enabling the communication between things which are connected to the internet. Gateways run multiple network based services in them which are often visible to any device in the same network. It acts as the entry point for the traffic...
Infrastructure monitoring applications currently lack a cost-effective and reliable solution for supporting the last communication hop for low-power devices. The use of cellular infrastructure requires contracts and complex radios that are often too power hungry and cost prohibitive for sensing applications that require just a few bits of data each day. New low-power, sub-GHz, long-range radios are...
Rescue teams require information about victims in need of help rapidly to improve survival rate at the time of disaster. Emergency Rescue Information Sharing System gathers and provides the information with a framework called METHANE in addition to efficient wireless link's selection using OpenFlow. However, it is difficult for those who rescue the victims except for the rescue teams to recognize...
In order to connect existing electronic devices that are equipped with fieldbus communication capabilities into the emerging Cyber Physical Systems (CPS), new models that combine live data from the underlying devices together with the metadata information that describes them have to be created. The new solutions should be based on widely accepted communication standards and should be easy to implement...
Internet has witnessed its paramount function transition from host-to-host communication to content dissemination. Named Data Networking (NDN) and Content-Centric Networking (CCN) emerge as a clean slate network architecture to embrace this shift. Pending Interest Table (PIT) in NDN/CCN keeps track of the Interest packets that are received but yet un-responded, which brings NDN/CCN significant features,...
The ever-increasing number of IoT devices necessitates a secure and scalable infrastructure to store and process generated data. Blockchain is an ideal choice with its decentralized, trustless architecture. However, low-power IoT end-devices do not possess enough horsepower to run a software client for intensive blockchain calculations. The purpose of this paper is to create a proof of concept to...
The more stringent requirements of many applications services — especially in terms of latency and bandwidth — is leading to the migration from data center based architecture towards a mobile-edge computing paradigm. This emerging network architecture aims to increase the overall infrastructure efficiency by delivering low-latency and bandwidth-efficient services. In this context, a not fully investigated...
Having seamless Internet connection is highly desirable for wireless sensor network (WSN). IPv6 offers the most promising solution to deal with the large quantity of nodes or "things". This demonstration presents a versatile research and development (R&D) or prototyping platform, on which we implement generic hardware and software framework for sensing/monitoring as well as remote control...
The proliferation of mobiles devices, application sprawl, and the ever-increasing data volume generates significant stress on cellular networks and particularly on the cellular core, also known as the Evolved Packet Core (EPC). This is further exacerbated by the deployment of hardware appliances for the implementation of a wide range of network functions (e.g., gateways, mobility management, firewalls,...
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
Advances in technology have enabled wireless devices to monitor and provide information than ever before. These sensors/actuators can be incorporated into any device to provide the user an immersive experience which include services such as connected-consumer, e-Health and smart transportation etc. Bluetooth Smart has emerged as popular wireless communication technology for such devices. The Received...
Cloud Storage is one of the hot research topic, now a day's many enterprises or even individuals have involved in cloud computing related technologies and the various organizations are developing cloud storage systems some of them are open source and freely available to the client for example: GlusterFS, Ceph, LVM, ZFS, Swift, Sheepdog, Kinetic etc. Many researchers have worked on these types of open...
In this paper, we have formulated a solution for proxy usages in a network. We all are surrounded with digital signatures around us, we just need to filter those to make our network clean, secure, efficient. Is what we did in this research work. There is also a great need of load optimization at different points in the network. We have proposed a way to use machine learning and neural networks to...
CCN (Content Centric Networking) is a new network architecture, which is optimized for content distribution by introducing route cache and request aggregation. However, current CCN is still similar to traditional Client/Server network architecture, with limited cache space, and the request aggregation policy is suitable for live streaming media rather than streaming media on demand. The main reason...
Heterogeneity in constrained networks and gateways is perhaps one of the single greatest challenges facing end-to-end management of devices and networks in the IoT. Today, the Lightweight M2M (LWM2M) protocol, leveraged on open Internet standards, has become a strong contender for REST-based IoT management. However, significant challenges exist for remote gateway management, particularly for proxies...
Aviation industry is one of the areas which have a strong potential to benefit from Radio Frequency Identification (RFID) and the Internet of Things (IoT). The most common loopholes experienced in Aviation industry for Baggage Handling are mislaid baggage, lost baggage and damage to belongings. So for providing a better and secure system to the passengers, we have proposed a design of baggage tracing...
The near future Internet of Things (IoT) allows devices to discover and to establish cooperation autonomously in an opportunistic manner. While the incentive service is available, the front-end inter-organisational devices may help each other not only on sharing information, but they can also share their Internet connection towards saving energy. Considering that different devices may have been configured...
A noninvasive estimation of central blood-pressure is required by the researchers or the medical practitioners in the cardiovascular field. Up to now, a simulation based approach has been pursued by many researchers and the practical results are obtained. As the progresses in the electrical engineering, the possibility that a wearable central blood-pressure gauge can be realized is increased. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.