The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional deception-based cyber defenses often undertake reactive strategies that utilize decoy systems or services for attack detection and information gathering. Unfortunately, the effectiveness of these defense mechanisms has been largely constrained by the low decoy fidelity, the poor scalability of decoy platform, and the static decoy configurations, which allow the attackers to identify and...
Energy efficient control of server rooms in modern data centers can help reducing the energy usage of this fast growing industry. Efficient control, however, cannot be achieved without: i) continuously monitoring in real-time the behavior of the basic thermal nodes within these infrastructures, i.e., the servers; ii) analyzing the acquired data to model the thermal dynamics within the data center...
Fraud prevention in the banking sphere is a very important type of activity which can cover a whole range of fraud schemes — both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of the system of monitoring and analysis of threats...
Internet-of-Things (IoT) is emerging as one of the popular technologies influencing every aspect of human life. The IoT devices equipped with sensors are changing every domain of the world to become smarter. In particular, the majorly benifited service sectors are agriculture, industries, healthcare, control & automation, retail & logistics, and power & energy. The data generated...
Active learning has demonstrated value in STEM education and various meta analyses show improvements in student performance when making use of active learning pedagogy and active learning classrooms. One limiting factor to extending the reach of active learning is cost. Many models for state-of-the-art active learning environments make use of tools and infrastructure through which students can connect...
Securing Internet of Things is a challenge because of its multiple points of vulnerability. In particular, Distributed Denial of Service (DDoS) attacks on IoT devices pose a major security challenge to be addressed. In this paper, we propose a DNS query-based DDoS attack mitigation system using Software-Defined Networking (SDN) to block the network traffic for DDoS attacks. With some features provided...
The number of diabetes patients is increasing dramatically. Diabetes has many reasons and can lead to severe complications. It has been proven that early diagnosis and effective monitoring and assistance can decrease the effect of this disease. Thus, this paper presents general diabetes system for patient's pre-diagnosis, monitoring and assistance. Client java graphical interfaces, in addition to...
In this paper, we describe a new teaching approach whose objective is to implement entrepreneurship-based learning. The proposed teaching approach is essentially a project-based approach, but, with two novel key components that give it the entrepreneurship emphasis. First, the main idea is to divide students into groups of four or five members and have each team go through the process of starting-up...
Cloud computing has enabled many applications to dynamically accommodate their resources in response to variations in their workloads. Elastic scaling is implemented mostly via reactive techniques that are slow to respond and may induce service degradation during the adaptation period. To avoid those pitfalls, proactive techniques have emerged as an alternative. However, these are typically limited...
In this paper, an online working condition monitoring system is designed to early warn environmental quality in manufacturing industry. It is very crucial to provide real time and accurate data for staffs, stakeholders and control center to monitor factory air quality at working place. By uploading the all collected data on internet, the environmental condition can be monitored in real time by users...
Smart metering is one of the main objectives for the EU member states to ensure the benefit of consumers on the long term. Due to its functionality, smart meters have a wide applicability in: power quality monitoring, energy savings, data awareness and fraud detection. With long-term cost benefits of the smart meters, it is expected that 72% of European consumers will have a smart meter for electricity...
It is shown that the excessive inhalation of PM (Particulate Matter) 2.5 will seriously affect the health of human. Many countries have deployed various detectors for air pollution in order to report concentration of PM2.5 to show how much seriousness of air pollution is. But, what more important is how much PM 2.5 has been inhaled by people anytime and anywhere. Therefore, in this paper, we propose...
Recently, research related to medical robots received considerable attention due to an increase in aging population. However, most of the existing approaches for designing medical robots have drawbacks in terms of lacking mobility, real-time monitoring of health conditions and emotional response. In this paper, we present a design for a cloud-assisted medical robot with mobility, which can remotely...
Monitoring of residences and businesses can be effectively performed using machine learning algorithms. As sensors and devices used for monitoring become more complex, having humans process the information to detect intrusions would be expensive and difficult to scale. We propose an automated home/business monitoring system which resides on edge servers performing online learning on streaming data...
Science is conducted collaboratively, often requiring knowledge sharing about computational experiments. When experiments include only datasets, they can be shared using Uniform Resource Identifiers (URIs) or Digital Object Identifiers (DOIs). An experiment, however, seldom includes only datasets, but more often includes software, its past execution, provenance, and associated documentation. The Research...
Remote access Trojans (RATs) are used by attackers to compromise and control the victim machine. In this work, a novel Network-based framework is introduced for detecting RAT bots based on data mining techniques. Several machine learning (ML) techniques are used to differentiate between benign and RAT infected machines. Various performance measurements are used to evaluate the performance of the proposed...
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
This contribution shows how rationalized energy consumption can be achieved using user-oriented mobile application. It is undoubtable that energy efficiency improvement is one of the most important targets to be achieved on every society as a whole and in power system in particular. With the advent of smart grids, residential end users are expected to shift from their passive role as consumers of...
Process monitoring and controlling system is essentially a data monitoring event transmission system, they are usually developed based on the procedure languange C with high cost and in low maintainability. functional reactive programming is a time-saving, bug-preventing programming paradigm worthy of control system to implement. In this paper the implementing the new kind of functional reactive programming...
Paper presents a solution providing OPC UA connectivity from a common web user using web technologies. Integration of OPC UA with the web may represent an important contribution to enhance its interoperability, allowing integration with web applications, IoT and WoT. The main difference with the solutions available in literature is that user may have no knowledge of OPC UA standard. A web-based platform...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.