The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Teaching programming using Massive Open Online Courses (MOOCs) is gaining popularity due to their scalability and efficiency of knowledge distribution. However, participating in these courses usually means fully committing to the supplied programming environment in the browser. While this allows a consistent and controllable setup, learners do not gain experience with actual development tools, such...
Interactive learning tools allow students to explore STEM concepts deeply, improving educational outcomes. Interactive tools that use cloud computing resources can (1) explore computationally intensive concepts and (2) seamlessly link concepts to graphical representations. When these goals conflict, good design, and implementation principles are needed to (1) preserve interactive response times and...
This paper presents a solution for establishing communication with Icecast and Shoutcast audio broadcasting servers. Web radio station is implemented, which means that is possible to broadcast an audio content from the local computer through Shoutcast and Icecast servers. Also, audio player is implemented for both local files, as well as web radio using FFmpeg libraries for audio package manipulation...
In the recent years, we have observed the development of several connected and mobile devices intended for daily use. This development has come with many risks that might not be perceived by the users. These threats are compromising when an unauthorized entity has access to private big data generated through the user objects in the Internet of Things. In the literature, many solutions have been proposed...
There is a strong focus on the use of Web Real-Time Communication (WebRTC) for many-to-many video conferencing, while the IETF working group has left the signalling issue on the application layer. The main aim of this paper is to create a novel scalable WebRTC signalling mechanism called WebNSM for many-to-many (bi-directional) video conferencing. WebNSM was designed for unlimited users over the mesh...
The state-of-practice for Internet of Things (IoT) applications is deployment on specialised networks of embedded devices connected to a cloud backend. While this paradigm has successfully supported a range of IoT systems, its power is limited by the high latency and bandwidth caused by communications with remote data servers and the inability to share specialised IoT infrastructure across applications...
In spite of their growing maturity, current web monitoring tools are unable to observe all operating conditions. For example, clients in different geographical locations might get very diverse latencies to the server; the network between client and server might be slow; or third-party servers with external page resources might underperform. Ultimately, only the clients can determine whether a site...
Mobile edge computing (MEC) has recently emerged as an important paradigm to bring computation and cache resources to the edge of core networks. However, the resources of edge network are relatively limited, so it is necessary to cooperate with data center (DC) which has sufficient computational resources. In this paper, we aim at designing a computation offloading and data caching model under the...
As the rapid development of mobile communication technology, smartphones have become indispensable elements in our daily life. Particularly, the increasingly rich smartphone applications (apps) bring great convenience to people while the defects generated in app designing and coding may pose unexpected threats to users. In this paper, we focus on the issue of data leakage between the app client and...
Accessing the Internet through Wi-Fi networks offers an inexpensive alternative for offloading data from mobile broadband connections. Businesses such as fast food restaurants, coffee shops, hotels, and airports, provide complimentary Internet access to their customers through Wi-Fi networks. Clients can connect to the Wi-Fi hotspot using different wireless devices. However, network administrators...
Pervasive usage and wide-spread sharing of Electronic Health Records (EHRs) in modern healthcare environments has resulted in high availability of patients' medical history from any location and at any time, which has potential to make health care services both cheaper and of higher quality. However, EHRs contain huge amounts of sensitive information which should be protected from unauthorized accesses,...
This paper presents the summary prefix tree (SPT), a trie data structure that supports efficient superset searches over DHT. Each document is summarized by a Bloom filter which is then used by SPT to index this document. SPT implements an hybrid lookup procedure that is well-adapted to sparse indexing keys such as Bloom filters. It also proposes a mapping function that permits to mitigate the impact...
The use of Bluetooth Low Energy (BLE) recently became famous in crowd localization services. In this article we show that such service induces significant threats and we propose a scheme that achieves privacy preserving crowd localization. Crowd localization applications leverage all their users to perform periodic BLE scan and detect the nearby tracked devices. The users run a smartphone application...
This paper presents comparison of GaN based switched-tank converter (STC) and traditional cascaded voltage divider (CVD) dc-dc converter for data center applications. The operation principle of two kinds of converters are presented. And simulations with Saber are both conducted to verify the proposed comparison, respectively. The system volume and efficiency are fully compared via GaN based device...
We introduce a methodology for efficient monitoring of processes running on hosts in a corporate network. The methodology is based on collecting streams of system calls produced by all or selected processes on the hosts, and sending them over the network to a monitoring server, where machine learning algorithms are used to identify changes in process behavior due to malicious activity, hardware failures,...
This paper is based on the experiences with implementation of information systems within preparation to deal with crisis situations in terms of crisis management in the Slovak Republic with Introduction to the state of the art, the Unified Information System of Economic Mobilization and Development in Slovakia of the Program and Information System — EPSIS®JISHM. We also focus on new challenges in...
There is an increase in the number of elderly people living alone, whose children make living in other cities or even other countries. Once they are ill or in an accident, they can only depend on staff of nursing care centers, instead of their children. Therefore, a system which help the elderly to live in their apartment alone is needed. Through the investigation of the elderly living in the community,...
The blockchain technology is gaining momentum because of its possible application to other systems than the cryptocurrency one. Indeed, blockchain, as a de-centralized system based on a distributed digital ledger, can be utilized to securely manage any kind of assets, constructing a system that is independent of any authorization entity. In this paper, we briefly present blockchain and our work in...
Rapid development of modern science and technology drives the development of data acquisition technology. Data mining technology in the digital display instrument, site acquisition, and other fields has a broad demand. This paper studies the intelligent meter data acquisition method based on OPC communication. It proposes the calculation method of the operation time for key equipment based on the...
To integrate different types of devices around Erhai, China, a three layer architecture is introduced. Edge computing nodes are inserted between the server system and the end devices. A metadata model is proposed to unify the representation of devices, measurement and the interactive message between the web services and devices. The edge nodes firstly function as translator between the web services...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.