The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Intrusion Detection Systems (NIDSs) play a crucial role in detecting malicious activities within the networks. Basically, an NIDS monitors network flows and compares it with the pre-defined suspicious patterns. To be effective, different intrusion detection algorithms and packet capturing methods have been implemented. With rapidly increasing network speeds, NIDSs face a challenging problem...
In this work, the principal aim is establishing networks parameters of wireless sensor. These devices can transmit variables to monitoring the quality of tourist beaches in the Colombian Caribbean. We propose a methodology to choose the network elements and its technologies. We analysis data based on coverage and implement the prototype. We show that the maximum distance between nodes is 33 m at mesh...
Wireless communication technology is spreading rapidly to all areas of our lives. The technology, which has a wide range of applications from radios, intelligent home systems, automation applications to GPS units, was used in monitoring the workers working in mines in this study. Most of the mining area underground mining is risky and the possibility of accident (gas jams, the explosion and dents,...
With the development of cultural level, the traditional tourism has not meet the needs of the development of the people. The development of traditional tourist scenic areas has been affected by the technology and the cloud computing, so we need continuous innovation and development, it can bring the new experience of the tourist. In this paper, from the angle of tourist, scenic, government, we will...
In order to improve the management intelligent level and the level of information sharing for higher law college instructors, and improve the efficiency of management of higher law college counselors work, and promote the sharing of college counselors and educational resources and scheduling information, Higher Law College Counselors work management system is developed and designed. The system adopts...
Current approaches to Information-Centric Networking (ICN) facilitate the publication and retrieval of content in a network through a variety of discovery, caching and forwarding approaches, thus defining an equivalent of the data plane in the current Internet infrastructure. However, in contrast to the current Internet, ICN lacks a definition of the control plane for the management of the operation...
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
In recent years, privacy issues in the networking field are getting more important. In particular, there is a lively debate about how Internet Service Providers (ISPs) should collect and treat data coming from passive network measurements. This kind of information, such as flow records or HTTP logs, carries considerable knowledge from several points of view: traffic engineering, academic research,...
Cyber-attacks have become more threatening as Internet evolves, particularly for Internet Service Providers (ISPs) that play a rule of carrying them to their subscribers. In order to protect themselves and their subscribers, ISPs invest in typical protection systems like IDS, IPS, or Firewalls, that are designed for perimeter-based operation. Even though these expensive systems are efficient to protect...
Triage on the battlefield is a very challenging task. Life of the wounded soldiers depends on the efficiency of this process and there is still lack of supporting solutions. This paper presents a new approach for using Internet of Military Things in combat triage. We propose an ontological approach to evaluate soldiers' health state and information framework which allows first responders and commanders...
The development of the Internet functions now affects many activities, talks, meetings, shopping, and learnings. E-Learning is part of the development models of learning that utilizes the internet. The current development model of online learning still needs support and new innovations. Politeknk Elektronika Negeri Surabaya (PENS) has an online learning application that uses the Moodle LMS. However,...
Museum environmental monitoring is an important issue for the artifact conservation. Many solutions have been proposed to tackle this problem, but the museum constraints prevent an easy application in several cases, especially if the monitoring has to be performed in museums where an environmental control system has been already installed. This paper describes a simple though powerful solution, which...
The Locator/Identifier Separation Protocol (LISP) separates classical IP addresses into two categories: one for identifying terminals, the other for routing. To associate identifiers and locators LISP needs a specific mechanism, called mapping system. This technology is still at an early stage but two experimental platforms have already been deployed in the Internet: LISP Beta Network and LISP-Lab...
Energy fuels the growth and development of any country, and as such effective monitoring, measurement, billing and access control is imperative. This paper presents a device that uses the evolving Internet of Things (IoT) technology in the design and implementation of an Internet based prepaid energy meter often referred to as smart meters. The energy measurement and billing system is automated. The...
In this paper, we explore the task of intellectual information system creation for content formation. We developed the general recommendations for design of the intellectual system. Our system has special modules for processing of information resources. We created the software for formation, control, and implementation of content and made experiments on “Online newspaper” and “Online magazine” systems...
In this paper we discuss the Internet of Things (IoT) by exploring aspects which go beyond the proliferation of devices and information enabled by: the growth of the Internet, increased miniaturization, prolonged battery life and an IT literate user base. We highlight the role of feedback mechanisms and illustrate this with reference to implemented computer enabled factory control systems. As the...
Specialists of a number of scientific institutes in this article present examples of successful models of modern press services in institutions in the field of science and education in Russia and research their key methods in work.
Websites have become a form of information distributors; usage of websites has seen a significant rise in the amount of information circulated on the Internet. Some businesses have created websites that display services the business renders or information about that particular product; businesses make use of the Internet to expand business opportunities or advertise the services they render on a global...
In this paper, the principles of organization of a scientific information system on active seismology providing a holistic view of the subject and various aspects of scientific activity are considered. The subject ontology of “Active Seismology” is used as the conceptual basis and information model for the system.
This paper proposes a design to implement Intelligent Examination subsystem in the Internet Plus environment, which uses structure model combining B/S and C/S, JSP technology and SSH frames. Student examination terminal facilitates automatic acquisition and maintenance of exam candidate's face image for automatic authentication of its identity, automatically obtaining examination papers' information,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.