The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The detection mechanism provided by current antimalware technologies expects that security researchers build a signature to uniquely identify the malicious samples. Once obtained, the signature will made available to final users using the update mechanism. This time window, which begins when malware is released and it lasts until the malware is identified, it is called zero-day window and represents...
We have conducted an empirical study of the latest 5GHz IEEE 802.11wireless LAN (WLAN) variants of 802.11n (5GHz) and 802.11ac (Wave 1), underdifferent cell load conditions. We have considered typicalconfigurations of both protocols on a Linux testbed. Under light load, there is no clear difference between 802.11n and 802.11ac in terms ofperformance and energy consumption. However, in some cases of...
In wireless sensor networks (WSNs) energy balancing and energy efficiency are the key requirements to prolong the network lifetime. In this paper, we investigate the problem of energy hole, where sensor nodes located near the sink or in some other parts of the network die very early due to unbalanced load distribution. Moreover, there is a dire need to utilize the energy resource efficiently. For...
Many devices communicate over Wireless Local Area Networks (WLANs). The IEEE 802.11e standard for WLANs is an important extension of the IEEE 802.11 standard focusing on QoS that works with any PHY implementation. The IEEE 802.11e standard introduces EDCF and HCCA. Both these schemes are useful for QoS provisioning to support delay-sensitive voice and video applications. EDCF uses the contention window...
This work explores the theoretical and practical performances of the two most recent IEEE standards, 802.11n and 802.11ac. Experiments were conducted to measure data rates to characterize performance effects of distance and interference between different channels. We conclude that the majority of test cases show 802.11ac achieved higher data rates than its predecessor, as expected. However, performance...
In this paper, we introduce a road surface conditionunderstanding and sharing system. Traffic accidents and obstructionsdue to bad weather conditions and poor road conditions areserious social problems. It is necessary for drivers to understandweather and road conditions in advance to avoid traffic accidentsand obstructions and it is necessary to alert drivers to weatherand road conditions in order...
In case of large scale disaster, officers of local government will receive a large amount of information related disaster status in order to make decision what to do into first responding tasks. Moreover, there is some problems caused by delaying of report on these information, this delay be an obstacle to take disaster countermeasure activity. In this paper, we describe an operation method for unified...
Enhancing Quality of Service (QoS) in mobilenetworks is the key aim for mobile operators. Mobile networkstransport several forms of data traffic for real-time applications(i.e., video monitoring). These applications need to get theadvantage of QoS adaptation. Numerous scheduling techniquesare utilized at the router to assure the QoS of the mobilenetworks. Upcoming 5G mobile networks will be launched,...
Video streaming over vehicular networks has considerable benefits for both road safety and entertainment. In this paper, realtime videos encoded with Scalable Video Coding (SVC) over cooperative vehicular networks are investigated to improve the performances of the video streaming services. We formulate a joint optimization problem to answer the questions of how to select the relay vehicular users...
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect the intrusion in Tor...
A Mobile Ad hoc Network (MANET) is a multihop wireless network in which the mobile nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due to this challenging environment the mobile nodes can be grouped into clusters to achieve better stability and scalability. Grouping the mobile nodes is called clustering, in which a leader node is elected to manage the entire network...
Forecasting visitor arrivals is of great importance since it is an indicator of the tourism demand and can serve as the reference for the government policies about tourism and the business strategies of tourism industries. So an accurate forecasting model must be developed. There are two machine learning algorithms, including support vector machine and neural network, which are include in the comparison...
In this paper, we first introduce stepping-stone intrusion, and summarize the most popular techniques to detect stepping-stone attacks. Upon summarizing stepping-stone intrusion detection techniques, five modules are proposed and integrated into cybersecurity curriculum. Ten labs which span from making stepping-stone intrusion, collecting TCP/IP packets, matching Send and Echo packets, comparing thumbprint,...
Using LED lighting has many advantages such as power efficient, better quality, long life span, and focus emission. LED lighting has been employed in our daily life in various ways, (car lamps and lights in vehicles, roadside signal lights, indoor lighting systems, etc.). Moreover, LED light bulbs can also be employed for wireless data communications, namely visible light communication (VLC), which...
The purpose of this study is to clarify the relationship between a rugby player's personality and length of career and personality and position. This study was conducted with 59 male university rugby team members. The psychological tests were classified by athletic position and athletic experience. The data from the tests was analyzed by T-test and chi-squarestest. As a result, there was no significant...
Spatial organization is a core challenge for all large agent-based models with local interactions. In biological tissue models, spatial search and reinsertion are frequently reported as the most expensive steps of the simulation. One of the main methods utilized in order to maintain both favourable algorithmic complexity and accuracy is spatial hierarchies. In this paper, we seek to clarify to which...
An insider contributes maximum to the leakage ofsensitive information knowingly or unknowingly in an enterprise. Therefore, the need for persistent protection of such informationis critical. At the same time, enterprise friendly features forrights and ownership management are of great importance to adigital rights management (DRM) system considering thedynamism of enterprise workforce in a large enterprise...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.