The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper aims to provide insights on how to collect Facebook user data based on Facebook Graph API V2.0 or newer. A proof of concept application is developed that invites users to participate in the research and collect certain data. User's possible circle of friends is built, based on their interaction with others. The larger context of this research includes collecting relevant big data for a...
Sensor technology in robotics applications has increased in complexity in recent years. Therefore, there is a need for solutions to process sensor data that matches said complexity while still being simple form a computational point of view. Our research focuses on developing an algorithm which can process data from an array of identical infrared sensors, to identify the direction from which light...
This paper proposes an experimental evaluation of the IEEE 802.11ac standard. The evaluation testbed is comprised of two National Instruments Universal Software Radio Peripheral (NI USRP) 2954R Software Defined Radios (SDRs) controlled by the NI-PXIe-8840 Quad-Core embedded computer running the 802.11 Application Framework and Lab VIEW Communications 2.0. Two evaluation scenarios are analyzed: (1)...
In this paper we review the proposed RC4 key scheduling algorithm called KSAm, and we present new cryptanalytic results concerning the effect of the Fluhrer-Mantin-Shamir invariance weakness on KSAm. Taking into account that the KSAm can be integrated within the entire class of known-plaintext attack resistant stream ciphers, whose design is based on the Knuth Fisher-Yates principle for generating...
The data transfer in the Grid at CERN (the European Organization for Nuclear Research) has seen constant improvement, be it through optimizing the existing tools, GridFTP and GFAL2 or by adding new tools such as XRootd. Unfortunately, all these have reached the maximum limit in terms of throughput. They are limited not by the network infrastructure, but by the fact that they use a single source for...
The operation and maintenance of large distributed systems that are subject to high QoS conditions has led to the need of designing and developing advanced monitoring tools that facilitate the administration of the critical services required by the user communities. RASSMon is a portable, reliable, secure software platform able to collect monitoring data from multiple sources in heterogeneous environments...
Cisco DevNet Always-On APIC-EM Sandbox is useful in the phase of learning about software-defined networking, allowing to perform experiments, but without the possibility to change the topology the extent of development is limited. In this paper a Cisco APIC-EM SDN Controller was installed in a private cloud orchestrated by OpenStack. The major objective was to create a virtualized testbed, consisting...
Europe's leading collaboration on e-infrastructure and services for research and education, GÉANT, has recognised an increased demand for cloud services and technologies from the user's community. Research and education institutions are already faced with wide range of cloud services available on the market. Many opportunities and benefits can be achieved with proper usage of cloud services, but acting...
This paper presents an indoor navigation system using visible light communication, taking advantage of the lightning in a room to provide shoppers their current location and a path towards a searched item. The system requires simple low-cost infrastructure due to inexpensive LEDs. The receiver comprises a mobile application installed on the customer's smartphone. The LED-based indoor navigation system...
This paper aims to develop an online aggregator of news feeds and posts from social network platforms such as Twitter and Reddit. The developed aggregator, uses Rich Site Summary (RSS) for article indexing, as opposed to web crawling solutions, because RSS is a very popular standardized format for distributing dynamic web content (Extensible Markup Language — XML). In addition to RSS feeds, we index...
Wireless transmission is, broadly speaking, considered unreliable and unstable. For real-time applications, redundancy must be counted as a solution for preventing system unavailability. In this paper a testbed comprised of three National Instruments USRP-RIO platforms (two acting as access points, and one as a client station) was set in order to test the performance of a redundant IEEE 802.11-based...
The existing communication technologies for IOT have become either saturated or do not meet actual needs, regarding long distances or low power consumption. We propose a study about mobility for the LoRa protocol, a new Low Power Wide Area Network technology. The paper draws upon a short overview of LoRa physical layer protocol, as well as on our testing design, some distances achieved and signal...
Since computing infrastructure has intrinsically a redundant logic, budget saving practices or understaffing of IT departments lead to an “emergency room” service paradigm. However, a treasure of information that could facilitate preemptive maintenance is buried in the logs and messages that are automatically generated by regular processes. Such information is typically ignored because of the shear...
As the Internet of Things implies building systems of interconnected everyday objects, programming such complex devices can be a struggle. There are multiple possible programming approaches when building a smart system, each with its pros and cons. This paper presents a comparison between several existing approaches, but also our proposal of a BPMN based approach that we applied to the Internet of...
Image size is increasing every day, according to their accuracy and resolution; where the memory needed to store these images become larger with time, Image compression algorithms are the utilities used to utilize the memory resources; this is done by reducing the space needed to store these images, natural images are the best images to use in testing the compression images; since the adjacent pixels...
The efficiency of bit counting operations can have a considerable impact on the performance of file systems, databases, machine learning algorithms and information security systems. Recognizing the great importance of bit counting, recent processors provide hardware implementations of dedicated instructions for efficient population counting. We have previously studied the never ending problem of counting...
Physical activity represents a key element for elderly people to maintain a healthy life. This paper presents a game for supporting and stimulating elderly people in performing physical activity. The game is composed of different type of exercises that are selected based on the user's profile and health status. The results are presented to the user in multiple ways that are correlated with his/her...
In mobile robotics, there are already various highly manoeuvrable structures that, in order to be exploited to their full capacity, require specially designed control systems. Often, the sensing elements available for these structures are either limited or costly. The former is the case in odometry, where information is scarce and needs corroboration with other measurement methods. To overcome this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.