In the Moslem countries Halal food is one of the concerns and consideration before having the food, Halal food is not only food or beverage but more than how to serve and preparation according to the Islamic law. Rest...
详细信息
In the Moslem countries Halal food is one of the concerns and consideration before having the food, Halal food is not only food or beverage but more than how to serve and preparation according to the Islamic law. Restaurants or premises to serve the food must follow Halal food regulation and procedure and certified by authority, thus Halal certification at the premises is requirement for the Moslem peoples before having the food. Nowadays, many premises never apply and misuse Halal certification or never renew certificate according to authority regulation because of some reason such need to do inspection at the premise and need to pay some of money. In this paper propose the application of Near Field Communication (NFC) technology to premises Halal certification, with NFC chip attached into the Halal certificate shown at the premise then customer or authority easy to check authentication of Halal certificate hold by premise. Today, smart phone is common to the people and everybody has it for phone call, internet access or furthermore to do some application such mobile payment etc. Nowadays, most of smart phone attached with NFC enable with extra feature to apply in Halal food authentication, an application software is design to the customer and can be download at authority website then by tap to the Halal certificate that embedded with an NFC chip, customer can see whether Halal certificate is authentic or not. Another advantages this system is authority easy to spot check, either Halal certificate have been renew or authentic by premise is just tap by mobile phone or handheld reader then connect to authority database.
Wormable system vulnerabilities continue to be identified and so fast spreading network worms continue to pose a threat to the internet infrastructure due to their increased virulence, speed and sophistication in succ...
详细信息
ISBN:
(纸本)9781509001552
Wormable system vulnerabilities continue to be identified and so fast spreading network worms continue to pose a threat to the internet infrastructure due to their increased virulence, speed and sophistication in successive internet-wide outbreaks. The cost of a single worm outbreak has been estimated to be as high as US $2.6 billion. In this paper, we report the empirical analysis of distributed worm detection and prevention countermeasure Rate Limiting + Leap Ahead (RL+LA) by using Pseudo-Witty worm with real outbreak characteristics of Witty worm. RL+LA, is a distributed automated worm detection and containment scheme that is based on the correlation of Domain Name System (DNS) queries and the destination IP address of outgoing TCP SYN and UDP datagrams leaving the network boundary, while it also utilizes cooperation between different communicating scheme members using a custom protocol, which we term Friends. The results show a significant increase in time of infection of Witty worm, when the counter-measure scheme is invoked, although it cannot completely stops the propagation of worm.
e-lab is a remote laboratory which provides the control of real physics experiments over the internet. The robustness of the laboratory framework has allowed the implementation of new experiments outside the main phys...
详细信息
ISBN:
(纸本)9781467377188
e-lab is a remote laboratory which provides the control of real physics experiments over the internet. The robustness of the laboratory framework has allowed the implementation of new experiments outside the main physical laboratory, for instance in high schools and science centres. To reduce costs and the number of maintenance interventions, a new and simple hardware platform to access and control the remote experiment, including video encoding and streaming was developed over the Raspberry Pi computer. Such hardware platform and network implementations are presented in this paper as a case study of a new hydrostatic e-lab experiment. The solution has been bench-marked against previous hardware configurations and proved to be adequate for the given purpose.
With the expansion of domestic university the school bus has become the main transportation on campus,but the scheduling problem of school bus is troubling departments and *** the scheduling problem of school bus,it...
详细信息
With the expansion of domestic university the school bus has become the main transportation on campus,but the scheduling problem of school bus is troubling departments and *** the scheduling problem of school bus,it's important to make a balance between two conflicting goals which based on the teachers and students' maximize satisfaction and vehicle transportation minimum *** this paper,we use the mobile internet to acquire some information,such as the real-time number of waiting in every site,waiting time,target site and passengers generalized cost of unit *** the daily bus uplink and downlink scheduling problem is simplified to a one-way *** the passenger request information in a fixed length of time and judging from the comparison of the passengers waiting for cost and service cost,then combining with the satisfactory optimization theory,we build a school bus real-time scheduling model,and raise an optimization for the school bus real-time scheduling,which is the certain research value.
Currently,many large corporations adopt secondary deployment pattern in their core ***,when head office analyze the company-wide data timely and fully in this model,it may cause problems of large amount of data,scatte...
详细信息
Currently,many large corporations adopt secondary deployment pattern in their core ***,when head office analyze the company-wide data timely and fully in this model,it may cause problems of large amount of data,scattered data storage,not timely responding to the changes in requirements and handiwork *** this paper based on the above problems,multidimensional data analysis technology and software tool which can support the end users on-demand self-service data analysis are *** software can analyze data according to different requirements of users,form a data view quickly,and show data through report forms ***,this flexible,efficient,practical and realtime data analysis tool has been successfully applied to State Grid Corporation of China(SGCC),which shows that it has some value in theory and practical applications.
With the development of internet, collaborative editing over Internert becomes a common office affair,which can support a harmonious human to human ***-to-peer(P2P) networks are very efficient for distributed collab...
详细信息
With the development of internet, collaborative editing over Internert becomes a common office affair,which can support a harmonious human to human ***-to-peer(P2P) networks are very efficient for distributed collabotative editing. Existing many collaborative editing algorithms depend on the number of sites, which cannot scale and suitable for P2 P networks. In this paper, we propose a optimal collaborative editing algorithm, which can be addressed two challenges as follows: it is based on RGA(Replicated Growable Array) algorithm, which has been proved correctness. Secondly, it does not depend on the number of sites and can support peer to peer collaborative editing.
Information Centric Networking (ICN) is a new communication paradigm for the upcoming Next Generation internet (NGI). ICN is an open environment that depends on in-network caching and focuses on contents rather than i...
详细信息
ISBN:
(纸本)9781509001552
Information Centric Networking (ICN) is a new communication paradigm for the upcoming Next Generation internet (NGI). ICN is an open environment that depends on in-network caching and focuses on contents rather than infrastructures or end-points as in current internet architectures. These ICN attributes make ICN architectures subject to different types of routing and caching attacks. An attacker sends malicious requests that can cause distributed Denial of Service (DDoS), cache pollution, and privacy violation of ICN architectures. In this paper, we propose a solution that detects and prevents these malicious requests in ICN routing and caching. This solution allows ICN routers to differentiate between legitimate and attack behaviours in the detection phase based on threshold values. In the prevention phase, ICN routers are able to take actions against these attacks. Our experiments show that the proposed solution effectively mitigates routing and caching attacks in ICN.
The internet of Things (IoT) refers to an interconnected world where physical devices seamlessly integrate into a global network and become active participants of business, information, and social processes. These phy...
详细信息
The internet of Things (IoT) refers to an interconnected world where physical devices seamlessly integrate into a global network and become active participants of business, information, and social processes. These physical devices are referred to as smart objects since they understand and react to the environment they reside in. However, deploying such internet-connected smart objects is challenging, since they need to be correctly configured with appropriate network and security credentials. This is exacerbated by the fact that they have minimal input capabilities and may be in inaccessible locations. In this article, we describe how to employ the 3rd Generation Partnership Project (3GPP) Generic Bootstrapping Architecture (GBA) to ensure secure authentication and communication among a variety of devices and services. Although GBA relies on the infrastructure of mobile network operators, it requires no mobile network access but only IP connectivity to perform authentication. We show the feasibility of our approach with a prototype implementation that incurs in a minimal memory overhead. Experimental results also show that our solution is energy-efficient.
The development of the food processing industry influences the economic development of a countryWe must realize the value-added food processing industryPeople39;s quality of life has an important role in promotingTh...
详细信息
The development of the food processing industry influences the economic development of a countryWe must realize the value-added food processing industryPeople's quality of life has an important role in promotingThis paper reveals the food processing industry in value creation connotationAccording to the status of food processing industry in Quanzhou, food processing industry is to make value-added food processing industry in Quanzhou development direction.
Motivation: On the semantic web, in life sciences in particular, data is often distributed via multiple resources. Each of these sources is likely to use their own international Resource Identifier for conceptually th...
详细信息
Motivation: On the semantic web, in life sciences in particular, data is often distributed via multiple resources. Each of these sources is likely to use their own international Resource Identifier for conceptually the same resource or database record. The lack of correspondence between identifiers introduces a barrier when executing federated SPARQL queries across life science data. Results: We introduce a novel SPARQL-based service to enable on-the-fly integration of life science data. This service uses the identifier patterns defined in the *** Registry to generate a plurality of identifier variants, which can then be used to match source identifiers with target identifiers. We demonstrate the utility of this identifier integration approach by answering queries across major producers of life science Linked Data.
暂无评论