The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Criminal activity in the Internet is becoming more sophisticated. Traditional information security techniques hardly cope with recent trends. Honeypots proved to be a valuable source of threat intelligence. In this work several Honeypots are combined into a Honeynet and observed exploitation attempts. The Honeynet consists of six Honeypots and was operated for 222 days. 12 million exploitation attempts...
Wireless Sensor Network (WSN) is an emerging area of research in the field of communication. With the explosive growth of its applications, WSN goes through various challenges. One of the important challenges is to maintain both coverage and connectivity in WSN. In this paper, we address the issue of maintaining sensing coverage and network connectivity in WSN by keeping a minimal number of sensor...
Gathering and analyzing of real time communicational traces in a society empowers us to formulate behavioral structure of its members. Reality Mining the core concept to support this enables us to collect digital breadcrumbs left by people while they perform their daily activities. Collection of these signals through sociometric badges and then formulating them for a visual view is shown in the further...
This paper is focused on two biometric modes which are very linked together: gait and footstep biometrics. Footstep recognition is a relatively new biometric based on signals extracted from floor sensors, while gait has been more researched and it is based on video sequences of people walking. This paper reports a directly comparative assessment of both biometrics using the same database (SFootBD)...
Reality mining provides us the ability to analyze sociometric badges determining how society behaves on particular situation. These sociometric badges are collectively organized to trace and predict behavioral stereotypes. The etiology of epidemic can be brightened much better when these sociometric badges are correlated with vaccination data. The model proposed in this paper is based on multi-level...
In e-Science, many scientific workflow management systems have been developed to integrate distributed computation resources, data sets, and mining algorithms. Users usually modify and rerun a workflow while repeating procedures: preprocess of data, selection of features, modification of data, selection of mining algorithms, generation of models, and evaluation of the models. These procedures are...
This paper proposes modeling the rapidly evolving energy systems as cyber-based physical systems. It introduces a novel cyber-based dynamical model whose mathematical description depends on the cyber technologies supporting the physical system. This paper discusses how such a model can be used to ensure full observability through a cooperative information exchange among its components; this is achieved...
We consider the control of impulsive systems with independent and identically distributed intervals between jumps. The control action and output measurement are assumed to take place only at jump times. We give necessary and sufficient conditions, in the form of LMIs, for mean square stabilizability and detectability and solve an infinite horizon quadratic optimal control problem, under appropriate...
This work presents an H2 performance analysis of the agreement protocol in the presence of noise. The agreement protocol is first transformed into an equivalent system induced by the dynamics of the relative, or edge, system states. The edge based representation is used to perform an H2 analysis of the system highlighting the roles of cycles in this context. For spanning trees and and certain k-regular...
The main goal of this research is concerning protocols to contain in-motion sensor nodes in large-scale topologies, and constitute a fleet wireless sensor network which can assistant in-flight localization and alignment for carrier-based aircraft. In this paper, we abstract network model according to specific conditions of F-WSN, and select performance indicators to evaluate it. A distributed multiple-weight...
CHRONIOUS project contributions supports the design and the development of an open architecture monitoring platform aiming on the detailed description of patient's health status focusing on people with chronic diseases. Essential modules of the CHRONIOUS system are the wearable platform responsible for the collection of several vital body signs, environmental, context and patient's activity signals...
Brain-computer interfaces (BCI) are emerging as a powerful tool for providing an alternative way of communication and environment control to severely disabled people. Among these systems, P300-based BCIs are widely diffused as they are easy to manage and do not require a training for the subjects. These systems, however, are still too slow so that they are actually used only by those patients that...
There is a growing need for enabling reprogramming in a working sensor network. We prefer to meet the requirements remotely instead of collecting all deployed sensors. Identifying the version difference of data items, having the same key, could significantly reduce the communication overhead, because only those out-of-date items should be updated at each sensor. Previous protocols need to exchange...
Sensor technologies have become vital today in gathering information about close by environments and its use in wireless sensor networks is getting widespread popular every day. Using heterogeneous nodes in a sensor network increases network reliability and lifetime. Our paper focuses on cluster head selection problem to improve full network coverage. Our proposed algorithm for cluster-based network...
Sleep scheduling protocols are widely used in wireless sensor networks for saving energy in sensor nodes. However, without considering the special requirements of object tracking, conventional sleep scheduling protocols may lead to intolerable degradation of tracking qualities when they are used in object tracking applications. To handle this problem, sleep scheduling protocols tailed for object tracking...
Many sensor networks are deployed to detect and track intruders. If the existence and location of sensor nodes is disclosed to the opponent, the nodes can be easily disabled or compromised. Wireless transmissions in the presence of the opponent are an important source of disclosure. In this paper, we first describe a way to quantify the stealthiness of the sensor node, with a numerical stealthiness...
This paper describes a supervision system for autonomic distributed systems (e.g., a cloud computing environment). It is designed as a supplementary service and is structured as an ensemble of components that implement an autonomic control loop, which does not require any a priori knowledge on the structure of the supervised system. The architecture devised is highly modular and can be configured...
Although networked embedded devices (NED) and service-oriented architectures (SOA) are often proclaimed as next generation technologies in industrial automation, there are some steps to take before they can be widely adopted. At the moment, productive systems are not SOA-ready and that is why integration approaches are interesting for manufacturers and operators of industrial plants. We suggest a...
In this paper, a new protocol termed CoopXLM that integrates cooperative communication and Cross-Layer Module (XLM) is created and examined via simulation. CoopXLM modifies XLM by allowing multiple cooperative nodes to participate in receiver-based contention. Although there is increased energy consumption for processing, simulation results indicate that across all duty cycles there is an average...
Power consumption is the main challenges of expanding the network, since the active nodes are more vulnerable to energy consumption. This paper proposes the tasks scheduling and distribution energy management mechanism of roles dormant cells (SRDC) to curb excessive consumption of energy consumed in the performance of duplicates task and unhelpful. Experimental results verify that the proposed of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.