The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the progress of technology and widespread use of internet, the data has become digital. It is getting easier day by day to copy, modify and transform digital data / applications into another form. The term of digital rights management (DRM) has been suggested to limit the use of data in digital media and to protect copyrights. Different architectures / technologies are used to provide DRM. In...
In last decades software development processes changed in order to address increasing complexity within decreasing implementation time. Hence, new practices like Kanban, Extreme Programming or Agile Software Development emerged. Model-based development is one potential option, which is more and more used to cope these new demands. However, adapting testing processes to the needs is still an open topic...
Prof. Edward Crawley has stated what an architecture is through the so-called FCF paradigm: "Architecture [..] consists of: Function, related by Concept, to Form". This definition has the merit to be simple, operative and applicable to all kind of engineered systems. However, by reviewing it thoroughly, we may expose some limitation, especially when trying to set-up a framework for architecture...
Network Address Translation (NAT) allows multiple devices with private addresses to share one public address. NAT was mainly confined to home gateways, but with the exhaustion of the IPv4 address space, large-scale NATs have been deployed. Other technologies causing large-scale address sharing are on the rise as well (e.g. VPNs). Large-scale address sharing is problematic, since it limits the number...
To be able to efficiently utilize high data rates of 100 Gbit/s and beyond, protocols must be carefully selected for specific communication parameters. At the same time, communication parameters, such as data rate/latency requirements and the channel quality, are not static. This contradiction can be solved by switching to the best suited protocol when communicationparameters change. However, replacing...
We present a new distributed} model of probabilistically checkable proofs (PCP). A satisfying assignment x ∊ \{0,1\}^n to a CNF formula \phi is shared between two parties, where Alice knows x_1, \dots, x_{n/2, Bob knows x_{n/2+1},\dots,x_n, and both parties know \phi. The goal is to have Alice and Bob jointly write a PCP that x satisfies \phi, while exchanging little or no information....
In this paper, we initiate the study of garbled protocols — a generalization of Yaos garbled circuits construction to distributed protocols. More specifically, in a garbled protocol construction, each party can independently generate a garbled protocol component along with pairs of input labels. Additionally, it generates an encoding of its input. The evaluation procedure takes as input...
Facial expression recognition is a very important research field to understand human emotions. Many facial expression recognition systems have been proposed in the literature over the years. Some of these methods use neural network approaches with deep architectures to address the problem. Although it seems that the facial expression recognition problem has been solved, there is a large difference...
With the development of Internet technology, Automatic Train Supervision (ATS) simulation system with traditional C/S architecture is more and more inconvenience for its incompatibility with internet and the high cost of maintenance and development. It is more practical to use B/S structure. However, computer interlocking(CI) system with ATC system using UDP protocol is not compatible with remote...
With the extensive application of industrial sensor networks in the embedded field, the interconnection communication between the embedded node is proposed for the cross-LAN/WAN communication needs. Traditional communication schemes using proprietary protocols and sink nodes do not fully meet the interoperability needs. Web Services technology has the characteristics of openness, platform interoperability,...
In order to improve the management intelligent level and the level of information sharing for higher law college instructors, and improve the efficiency of management of higher law college counselors work, and promote the sharing of college counselors and educational resources and scheduling information, Higher Law College Counselors work management system is developed and designed. The system adopts...
A distributed network can have faulty links and nodes. In such a case, reaching a decision amongst themselves become extremely difficult. The current work describes an effective solution for reaching an agreement in a distributed system in the presence of such faults. Furthermore, a partitioning method is used to reduce the overhead of exchanging messages.
In this paper, a wearable sensory system is proposed for lower leg swelling detection during sitting, standing and walking. This sensor potentially can be used to trigger controllable compression modalities that are used for vanous insufficiency disorders in the lower leg particularly, edema and orthostatic intolerance. The proposed sensory system includes two medical strain gauges and an accelerometer...
Time synchronization over a distributed BLE wireless network poses several challenging problems which may affect the accuracy of time stamping of events recorded by BLE devices. In this paper, we study the accuracy of a time synchronization scheme based on generation of an event in the application program at the time of BLE connection establishment. We discuss the background of the problem, explain...
Due to the ubiquitous presence of cellular networks and their exemplary success, they have been pushed forward to provide connectivity for Internet-of-things (IoT) applications with mass deployments of sensors and machines. Nevertheless, existing transmission protocols, e.g., orthogonal allocation or spectrum sharing, can be detrimental for both existing cellular users and IoT devices due to increased...
Bonus point systems are widely used for rewarding customer loyalty in both traditional and electronic commerce scenarios. Merchants aim to additionally increase revenue by targeted advertising using customer data. At the same time, customers wish to protect their privacy of what they purchase. Common systems neither provide sufficient protection of privacy, nor protect the customers' identities. Anonymity...
The software-defined networking (SDN) paradigm promises greater control and understanding of enterprise network activities, particularly for management applications that need awareness of network-wide behavior. However, the current focus on switch-based SDNs raises concerns about data-plane scalability, especially when using fine-grained flows. Further, these switch-centric approaches lack visibility...
Security protocols are critical components for the construction of secure and dependable distributed applications, but their implementation is challenging and error prone. Therefore, tools for formal modelling and analysis of security protocols can be potentially very useful to support software engineers. However, despite such tools have been available for a long time, their adoption outside the research...
Pathfinding algorithms are at the heart of several classes of applications, such as network appliances (routing), GPS navigation and autonomous cars, which are related to recent trends in Artificial Intelligence and Internet of Things (IoT). Moreover, advances in semiconductor miniaturization technologies have enabled the design of efficient Systems-on-Chip (SoC) devices, with demanding performance...
In the recent year's low power computing systems have gained popularity. Networks, which use low power computer systems and transmitted data by using wireless connection are called wireless sensor networks. Nowadays, the most topical researches pertaining to wireless sensor networks are grounded on the new optimization of structure of network transmission protocol, the routing optimization in transmission...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.