Artículos de revistas sobre el tema "Operating systems - mac users"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Operating systems - mac users.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Operating systems - mac users".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Hovden, Robert. "Running Digital Micrograph on Linux and Mac OSX". Microscopy Today 20, n.º 2 (28 de febrero de 2012): 24–27. http://dx.doi.org/10.1017/s155192951200003x.

Texto completo
Resumen
Gatan Digital Micrograph (DM) software is considered an industry standard among microscopists. The offline DM application is freely available from Gatan. Unfortunately, DM software has been designed to run only on Microsoft Windows operating systems, thus distancing the microscopy community from popular Unix-based systems, such as Linux or Mac OSX. An ad hoc solution to this problem has required a virtualized Windows operating system running on top of the user's native operating system. This is not only slow, having to emulate each processor instruction, but also requires installation and licensing of Windows and the virtualization software. However, with the aid of open-source resources, it is possible to run DM natively on Linux and Mac OSX (Figure 1). This article was written as a guide with easy-to-follow installation instructions to liberate users from the Windows emulation pidgeonhole and enable them to freely analyze data on Unix-based systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Sum, Chin-Sean, Gabriel Porto Villardi, Zhou Lan, Chen Sun, Yohannes Alemseged, Ha Nguyen Tran, Junyi Wang y Hiroshi Harada. "Enabling Technologies for a Practical Wireless Communication System Operating in TV White Space". ISRN Communications and Networking 2011 (28 de junio de 2011): 1–12. http://dx.doi.org/10.5402/2011/147089.

Texto completo
Resumen
This paper proposes the design of enabling technologies for practical wireless communication systems operating in the TV white space (TVWS). The main objective of this paper is to cover a macro perspective on the system design blocks including: (a) targeted use case applications and governing regulations, (b) channelization, physical (PHY) layer and medium access control (MAC) layer designs, and (c) achievable throughput and range. It is the intention of this paper to serve as a general guideline for designing wireless communication systems operating in TVWS. The core system design addresses both PHY and MAC layer issues with realistic system considerations. In the PHY layer, a channelization design that fits into the area-specific TV channels and a transceiver that enables data exchange in the TV bands are designed. In the MAC layer, a cognitive engine that manages access to vacant TV channels and MAC functionalities that facilitate effective medium access are also proposed. As a result, the system is capable of supporting up to a typical throughput of 80 Mbps, and a maximum number of 40 users, assuming all users performing the most bandwidth-hungry application in the use case scenario. The corresponding operating range is found reach up to 400 m.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Fenske, Ellis, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan y Erik Rye. "Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds". Proceedings on Privacy Enhancing Technologies 2021, n.º 3 (27 de abril de 2021): 164–81. http://dx.doi.org/10.2478/popets-2021-0042.

Texto completo
Resumen
Abstract Mobile device manufacturers and operating system developers increasingly deploy MAC address randomization to protect user privacy and prevent adversaries from tracking persistent hardware identifiers. Early MAC address randomization implementations suffered from logic bugs and information leakages that defeated the privacy benefits realized by using temporary, random addresses, allowing devices and users to be tracked in the wild. Recent work either assumes these implementation flaws continue to exist in modern MAC address randomization implementations, or considers only dated software or small numbers of devices. In this work, we revisit MAC address randomization by performing a cross-sectional study of 160 models of mobile phones, including modern devices released subsequent to previous studies. We tested each of these phones in a lab setting to determine whether it uses randomization, under what conditions it randomizes its MAC address, and whether it mitigates known tracking vulnerabilities. Our results show that, although very new phones with updated operating systems generally provide a high degree of privacy to their users, there are still many phones in wide use today that do not effectively prevent tracking.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Shiakallis, Odysseas, Constandinos X. Mavromoustakis, George Mastorakis, Athina Bourdena y Evangelos Pallis. "Traffic-Based S-MAC". International Journal of Wireless Networks and Broadband Technologies 4, n.º 1 (enero de 2015): 62–80. http://dx.doi.org/10.4018/ijwnbt.2015010105.

Texto completo
Resumen
Mobile Peer-to-Peer (MP2P) is a networking paradigm that will be exploited in the future to support technological advances and systems for the efficient provision of multiple services to mobile users. In a general context, the mobile community seeks to invest in on-the-fly services, by minimizing the effort and the increasing mobile users' performance. In this framework, the mobile Ad-Hoc Networks provide mobile nodes the flexibility of operating as flexible networking points, without the use of a centralized entity, where issues such as the energy consumption and the data packets transmission failure arise along with many more. Towards minimizing the factors that contribute to the increased consumption of the energy and the resources, as well as the loss of data, a Traffic-based S-MAC protocol is proposed in this paper to increase the data exchange and preserve the energy conservation, among the nodes in mobile Ad-Hoc Networks. The performance of the proposed protocol was thoroughly evaluated, by conducting multiple experimental results. The results verify the efficient performance of the protocol and indicate fields for further research and experimentation.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Ridwan y Adhi Susano. "APLIKASI EMAIL CLIENT MULTI-PLATFORM DENGAN ENKRIPSI DATA BERBASIS JAVA". Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, n.º 1 (10 de enero de 2023): 279–90. http://dx.doi.org/10.35870/jimik.v4i1.177.

Texto completo
Resumen
Client is an application that is used to send and receive e-mails through your computer without a browser. Simply by running the e-mail client application, the e-mail will automatically be downloaded to your computer. The more varied operating systems used by Users also sometimes make Users have to change email clients when moving operating systems, for example Windows Users who are used to Outlook have to use evolution on Linux, whereas when using Mac OS they have to use the Mail program. This is of course inconvenient for the User. Not to mention the security of the clinet email itself. In this research, software has been created to reduce existing problems. The method used in the design and manufacture of this software is the Guidelines for Rapid Application Engineering (Grapple) method. This software was created using Netbeans 7.0. This multi-platform email client application program with base64 encoding on a desktop base can run on three operating systems, namely Windows, Linux and Macinthos. This application can also encode with the base64 algorithm the contents of the message so as to maintain the confidentiality of the contents of the message in the email client itself.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Prestridge, Eddie B. "Unix-based workstations for digital image processing and analysis". Proceedings, annual meeting, Electron Microscopy Society of America 54 (11 de agosto de 1996): 610–11. http://dx.doi.org/10.1017/s0424820100165513.

Texto completo
Resumen
The modern workstation, with its inherent high speed and massive memory, allows the use of complicated image analysis and processing algorithms and artificial intelligence programs not available to current PCs and mini-computers.There is no single feature that differentiates the UNIX based workstation from a PC. Rather, it is its fundamental design that gives the workstation superior performance. This superiority in no small part is the result of the UNIX operating system. UNIX is a word that sometimes strikes fear into the hearts of mortal men! There is no reason to fear, however. Users of UNIX-based systems have no more interaction with the operating system than say users of WordPerfect running on a MS-DOS or MAC OS machine.UNIX is the only operating system that runs on a wide range of systems from laptops to mainframes. It is unique in at least five areas: 1) massive data sets handling, 2) multitasking, 3) multi-user, 4) security, and 5) networking. Let me give you what I think are usable descriptions for these five areas.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Bhurtel, Manish y Danda B. Rawat. "Unveiling the Landscape of Operating System Vulnerabilities". Future Internet 15, n.º 7 (24 de julio de 2023): 248. http://dx.doi.org/10.3390/fi15070248.

Texto completo
Resumen
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and compromise system security. This is a crucial area that requires active research; however, OS vulnerabilities have not been actively studied in recent years. Therefore, we conduct a comprehensive analysis of OS vulnerabilities, aiming to enhance the understanding of their trends, severity, and common weaknesses. Our research methodology encompasses data preparation, sampling of vulnerable OS categories and versions, and an in-depth analysis of trends, severity levels, and types of OS vulnerabilities. We scrape the high-level data from reliable and recognized sources to generate two refined OS vulnerability datasets: one for OS categories and another for OS versions. Our study reveals the susceptibility of popular operating systems such as Windows, Windows Server, Debian Linux, and Mac OS. Specifically, Windows 10, Windows 11, Android (v11.0, v12.0, v13.0), Windows Server 2012, Debian Linux (v10.0, v11.0), Fedora 37, and HarmonyOS 2, are identified as the most vulnerable OS versions in recent years (2021–2022). Notably, these vulnerabilities exhibit a high severity, with maximum CVSS scores falling into the 7–8 and 9–10 range. Common vulnerability types, including CWE-119, CWE-20, CWE-200, and CWE-787, are prevalent in these OSs and require specific attention from OS vendors. The findings on trends, severity, and types of OS vulnerabilities from this research will serve as a valuable resource for vendors, security professionals, and end-users, empowering them to enhance OS security measures, prioritize vulnerability management efforts, and make informed decisions to mitigate risks associated with these vulnerabilities.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Adekar, R. H. y A. K. Kureshi. "Performance Analysis of Heterogeneous Systems Ieee 802.11 and Ieee 802.16 Using Spectrum Sharing Mechanism". Advanced Engineering Forum 44 (17 de enero de 2022): 127–35. http://dx.doi.org/10.4028/www.scientific.net/aef.44.127.

Texto completo
Resumen
After the advent of cellular standards for mobile wireless voice telephony and data transfer, IEEE 802.11 and IEEE 802.16 standards evolved for wireless broadband data transfer. The IEEE 802.11 replaced the wired LAN and IEEE 802.16 was to wireless point-to-point provide broadband data transfer. IEEE 802.11 operates in 2.4 GHz and 5 GHz bands whereas IEEE 802.11, which was initially designed to operate on a licensed band, later switched to a 2-11 GHz band. However, both these standards used a 5 GHz unlicensed band for transmission causing the possible overlap of channels. The designed protocols fairly allow the sharing on an ad-hoc basis. IEEE 802.11 operated in distributed coordination mode using Distributed Coordination Function (DCF) and point coordinated mode using a dedicated coordinator node called Point Coordination Function (PCF). However, DCF mode allows spectrum sharing for multiple users. Both standards were not designed for coexistence and thereby they may cause interference to each other, degrading their performance. Mechanisms can be designed at various layers such as MAC or PHY to enable the coexistence with desired QoS. In this paper, a performance analysis of the impact of possible interference between IEEE 802.11 and IEEE 802.16 devices is presented. Therefore, this paper presents the approaches for allowing a reliable operation between IEEE 802.16 and IEEE 802.11 when both are sharing unlicensed spectrum 5GHz. In this paper, we propose advancements to the MAC of IEEE 802.16 Base Station (BS) where IEEE 802.11 frame transmissions are not required by an IEEE 802.16 system. Here, Co-existence between IEEE 802.11 and IEEE 802.16 is permitted without any exchange of data between both standards, and also it provides quality of service for both systems operating at unlicensed spectrum 5GHz.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Nasser, Hiba Imad y Mohammed Abdulridha Hussain. "Provably curb man-in-the-middle attack-based ARP spoofing in a local network". Bulletin of Electrical Engineering and Informatics 11, n.º 4 (1 de agosto de 2022): 2280–91. http://dx.doi.org/10.11591/eei.v11i4.3810.

Texto completo
Resumen
Even today, internet users’ data security remains a significant concern. One problem is ARP poisoning, otherwise referred to as ARP spoofing. Such attacks are intended to exploit the identified ARP protocol vulnerability. Despite no straightforward remedy for ARP spoofing being apparent, certain actions may be taken to maintain one’s safety. The most basic and common defence against a poisoning attack is manually adding MAC and IP addresses to the static ARP cache table. However, this solution is ineffective for large networks where static entries require considerable time and effort to maintain, whether by human input or via special tools and settings for the static entries of network devices. Accordingly, this paper aimed to monitor network packet information and detect the behaviour of ARP poison attacks on operating systems, for instance Windows and Linux. The discovery and defence policy systematically and periodically check the MAC addresses in the ARP table, enabling alerts to be issued if a duplicate entry is detected. This enables the poison-IP address to be blocked before a reply is sent. Finally, the results showed that the superiority was successfully achieved in the detection, prevention and reporting mechanisms in the real-world environment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Davis, Janel L., Brian Soetikno, Ki-Hee Song, Yang Zhang, Cheng Sun y Hao F. Zhang. "RainbowSTORM: an open-source ImageJ plug-in for spectroscopic single-molecule localization microscopy (sSMLM) data analysis and image reconstruction". Bioinformatics 36, n.º 19 (14 de julio de 2020): 4972–74. http://dx.doi.org/10.1093/bioinformatics/btaa635.

Texto completo
Resumen
Abstract Summary Spectroscopic single-molecule localization microscopy (sSMLM) simultaneously captures the spatial locations and full spectra of stochastically emitting fluorescent single molecules. It provides an optical platform to develop new multimolecular and functional imaging capabilities. While several open-source software suites provide subdiffraction localization of fluorescent molecules, software suites for spectroscopic analysis of sSMLM data remain unavailable. RainbowSTORM is an open-source ImageJ/FIJI plug-in for end-to-end spectroscopic analysis and visualization for sSMLM images. RainbowSTORM allows users to calibrate, preview and quantitatively analyze emission spectra acquired using different reported sSMLM system designs and fluorescent labels. Availability and implementation RainbowSTORM is a java plug-in for ImageJ (https://imagej.net)/FIJI (http://fiji.sc) freely available through: https://github.com/FOIL-NU/RainbowSTORM. RainbowSTORM has been tested with Windows and Mac operating systems and ImageJ/FIJI version 1.52. Supplementary information Supplementary data are available at Bioinformatics online.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Hasibuan, Ahmad Nurdin, Marsadi Aras y E. Taufik Rahmat. "MEMBERIKAN PELATIHAN MICROSOFT OFFICE POWERPOINT MELALUI APLIKASI ZOOM DITENGAH PANDEMI COVID-19 BAGI SISWA MADRASAH TSANAWIYAH". Jurnal Pengabdian Teratai 2, n.º 1 (30 de junio de 2021): 66–78. http://dx.doi.org/10.55122/teratai.v2i1.247.

Texto completo
Resumen
The shift of conventional learning systems to online systems is very, very sudden, there has been no thorough preparation. But everything must be carried out so that the learning process continues to run smoothly and all students actively participate in learning even in the Covid-19 pandemic situation. Microsoft Office PowerPoint or PowerPoint is a computer program that is used for presentations, this application was developed by Microsoft in a package of office applications, namely Microsoft Office, in addition to Microsoft Word, Excel, Access and several other programs. PowerPoint runs on Microsoft Windows and Apple Macintosh for Apple Mac OS users, although initially this application runs on the Xenix operating system. PowerPoint has been widely used, especially in offices and business people, teachers, students, and trainers. His version continues to grow from the 2003 version of the Microsoft Office System, Microsoft changed the name from Microsoft PowerPoint alone to Microsoft Office PowerPoint. Then, in Office 2013, the name is simply abbreviated as PowerPoint and it continues to develop PowerPoint is version 15 and so on until now
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Sil, Briti Sundar, Angana Borah, Shubrajyoti Deb y Biplab Das. "DEVELOPMENT OF RIVER FLOOD ROUTING MODEL USING NON-LINEAR MUSKINGUM EQUATION AND EXCEL TOOL 'GANetXL'". Journal of Urban and Environmental Engineering 10, n.º 2 (28 de abril de 2017): 214–20. http://dx.doi.org/10.4090/juee.2016.v10n2.214-220.

Texto completo
Resumen
Flood routing is of utmost importance to water resources engineers and hydrologist. Muskingum model is one of the popular methods for river flood routing which often require a huge computational work. To solve the routing parameters, most of the established methods require knowledge about different computer programmes and sophisticated models. So, it is beneficial to have a tool which is comfortable to users having more knowledge about everyday decision making problems rather than the development of computational models as the programmes. The use of micro-soft excel and its relevant tool like solver by the practicing engineers for normal modeling tasks has become common over the last few decades. In excel environment, tools are based on graphical user interface which are very comfortable for the users for handling database, modeling, data analysis and programming. GANetXL is an add-in for Microsoft Excel, a leading commercial spreadsheet application for Windows and MAC operating systems. GANetXL is a program that uses a Genetic Algorithm to solve a wide range of single and multi-objective problems. In this study, non-linear Muskingum routing parameters are solved using GANetXL. Statistical Model performances are compared with the earlier results and found satisfactory.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Sil, Briti Sundar, Angana Borah, Shubrajyoti Deb y Biplab Das. "DEVELOPMENT OF RIVER FLOOD ROUTING MODEL USING NON-LINEAR MUSKINGUM EQUATION AND EXCEL TOOL 'GANetXL'". Journal of Urban and Environmental Engineering 10, n.º 2 (28 de abril de 2017): 214–20. http://dx.doi.org/10.4090/juee.2016.v10n2.214220.

Texto completo
Resumen
Flood routing is of utmost importance to water resources engineers and hydrologist. Muskingum model is one of the popular methods for river flood routing which often require a huge computational work. To solve the routing parameters, most of the established methods require knowledge about different computer programmes and sophisticated models. So, it is beneficial to have a tool which is comfortable to users having more knowledge about everyday decision making problems rather than the development of computational models as the programmes. The use of micro-soft excel and its relevant tool like solver by the practicing engineers for normal modeling tasks has become common over the last few decades. In excel environment, tools are based on graphical user interface which are very comfortable for the users for handling database, modeling, data analysis and programming. GANetXL is an add-in for Microsoft Excel, a leading commercial spreadsheet application for Windows and MAC operating systems. GANetXL is a program that uses a Genetic Algorithm to solve a wide range of single and multi-objective problems. In this study, non-linear Muskingum routing parameters are solved using GANetXL. Statistical Model performances are compared with the earlier results and found satisfactory.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Vayadande, Kuldeep, Ankur Raut, Roshita Bhonsle, Vithika Pungliya, Atharva Purohit y Samruddhi Pate. "Efficient system for CPU metric visualization". 3C TIC: Cuadernos de desarrollo aplicados a las TIC 11, n.º 2 (29 de diciembre de 2022): 239–50. http://dx.doi.org/10.17993/3ctic.2022.112.239-250.

Texto completo
Resumen
There are multiple metrics associated with the smooth and efficient working of a computer system. Some of the crucial parts are like the CPU, memory usage and GPUs. For different Operating Systems, they have their own System Software for managing and analysing their sessions. Like Task Manager in Windows, Nmon in Linux and Activity Monitor in Mac. In addition to it, there are few applications software’s which perform similar tasks with slight modifications. In this paper, a web application is proposed that will fetch these performance metrics from the user's system and display them using dynamic charts. The proposed application is a system independent tool and can be useful for all operating system. The application also can be used to determine whether or not a game is compatible with the user's system based on the system requirements.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Mohammad, Marwa. "Applying Effective Software for Controlling Computers Remotely". Technium: Romanian Journal of Applied Sciences and Technology 4, n.º 10 (21 de diciembre de 2022): 188–96. http://dx.doi.org/10.47577/technium.v4i10.8023.

Texto completo
Resumen
Today, many educational institutes, labs, houses or organisations have their private Local Area Network (LAN), so they need to monitor employees, students in exams or machines which are working on the network. This paper aims to design and implement efficient application that can be used to track everyone who is working between 1-10 users (operating systems) on LAN network remotely; so access PC, Mac and Linux. In other words, it can monitor screens remotely, send a warning message and shutdown system. Including, it operates at low-cost, enables daily using in the services of all scales; and provide the network performance simultaneously. The implementation has achieved using Front end- JDK, JAVA language, Windows 7, 8, and10, Visio, Wireshark, Task manager, chart expert, Microsoft excel, ten computers, Ethernet & Wireless of LAN network, etc. This software has applied in real-world in students examinations at three schools in Iraq. As a result, this software eligible to allocate the task to clients to restrict them from misusing the resources. As well as, automates lab and monitor attendance with performance analysis.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Hussain, Rashid, Andrew Scott Hackett, Sandra Álvarez-Carretero y Lydia Tabernero. "VSpipe-GUI, an Interactive Graphical User Interface for Virtual Screening and Hit Selection". International Journal of Molecular Sciences 25, n.º 4 (7 de febrero de 2024): 2002. http://dx.doi.org/10.3390/ijms25042002.

Texto completo
Resumen
Virtual screening of large chemical libraries is essential to support computer-aided drug development, providing a rapid and low-cost approach for further experimental validation. However, existing computational packages are often for specialised users or platform limited. Previously, we developed VSpipe, an open-source semi-automated pipeline for structure-based virtual screening. We have now improved and expanded the initial command-line version into an interactive graphical user interface: VSpipe-GUI, a cross-platform open-source Python toolkit functional in various operating systems (e.g., Linux distributions, Windows, and Mac OS X). The new implementation is more user-friendly and accessible, and considerably faster than the previous version when AutoDock Vina is used for docking. Importantly, we have introduced a new compound selection module (i.e., spatial filtering) that allows filtering of docked compounds based on specified features at the target binding site. We have tested the new VSpipe-GUI on the Hepatitis C Virus NS3 (HCV NS3) protease as the target protein. The pocket-based and interaction-based modes of the spatial filtering module showed efficient and specific selection of ligands from the virtual screening that interact with the HCV NS3 catalytic serine 139.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Peng, Tianqi, Bei Gong y Jiangjiang Zhang. "Towards Privacy Preserving in 6G Networks: Verifiable Searchable Symmetric Encryption Based on Blockchain". Applied Sciences 13, n.º 18 (8 de septiembre de 2023): 10151. http://dx.doi.org/10.3390/app131810151.

Texto completo
Resumen
The blockchain-based searchable symmetric encryption (SSE) scheme allows the retrieval and verification of outsourced data on cloud servers in sixth generation (6G) networks while ensuring the privacy of data. However, existing schemes are challenging to comprehensively meet the requirements of 6G-based intelligent application systems for low latency, high security, and high reliability. To address these limitations, we present VSSE, a novel blockchain-based SSE scheme designed for 6G-based intelligent application systems. Our scheme constructs a state chain structure to resist file injection attacks, thereby ensuring forward privacy. Moreover, we execute the search and verification operations separately on the cloud server and blockchain, while introducing a bitmap index structure and message authentication code (MAC) technology to achieve efficient searching and dynamic verification. Notably, VSSE also includes access control functionality, permitting only authorized users to access relevant files. The combination of remarkable efficiency and strong security establishes our VSSE as an ideal solution suitable for implementation in G-based intelligent application systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Ariyadi, Tamsir y M. Rizky Pohan. "Implementation of Penetration Testing Tools to Test Wi-Fi Security Levels at the Directorate of Innovation and Business Incubators". Jurnal Penelitian Pendidikan IPA 9, n.º 12 (20 de diciembre de 2023): 10768–75. http://dx.doi.org/10.29303/jppipa.v9i12.5551.

Texto completo
Resumen
Wi-Fi networks have become a critical infrastructure in many organisations, including the Directorate of Innovation and Business Incubator. However, potential vulnerabilities in Wi-Fi networks also increase as technology advances. Therefore, testing is needed to identify and address security that can harm network users. This research aims to implement penetration testing tools in testing the security level of Wi-Fi networks at the Directorate of Innovation and Business Incubator. The penetration testing method is used to test security and assess the level of resistance to attacks on Wi-Fi in the form of simulated attacks. One of the operating systems that provides penetration testing tools that meet the needs of testing is linux times. The tools used in the penetration testing process are airmon-ng, airodump-ng, aireplay-ng, aircrack-ng, macchanger, ettercap and wireshark. The results showed that the Wi-Fi security of the Directorate of Innovation and Business Incubator still needs to be improved where the results of the four types of attacks only one failed, namely MAC Spoofing. In addition, the tests on Denial of Service, Cracking the Encryption, and Man-in-the-Middle attacks were successful. The application of anticipation by increasing Wi-Fi security based on the attacks that have been carried out can prevent these attacks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Zhang, Liujing, Jin Li, Wenyang Guan y Xiaoqin Lian. "Optimization of User Service Rate with Image Compression in Edge Computing-Based Vehicular Networks". Mathematics 12, n.º 4 (12 de febrero de 2024): 558. http://dx.doi.org/10.3390/math12040558.

Texto completo
Resumen
The prevalence of intelligent transportation systems in alleviating traffic congestion and reducing the number of traffic accidents has risen in recent years owing to the rapid advancement of information and communication technology (ICT). Nevertheless, the increase in Internet of Vehicles (IoV) users has led to massive data transmission, resulting in significant delays and network instability during vehicle operation due to limited bandwidth resources. This poses serious security risks to the traffic system and endangers the safety of IoV users. To alleviate the computational load on the core network and provide more timely, effective, and secure data services to proximate users, this paper proposes the deployment of edge servers utilizing edge computing technologies. The massive image data of users are processed using an image compression algorithm, revealing a positive correlation between the compression quality factor and the image’s spatial occupancy. A performance analysis model for the ADHOC MAC (ADHOC Medium Access Control) protocol is established, elucidating a positive correlation between the frame length and the number of service users, and a negative correlation between the service user rate and the compression quality factor. The optimal service user rate, within the constraints of compression that does not compromise detection accuracy, is determined by using the target detection result as a criterion for effective compression. The simulation results demonstrate that the proposed scheme satisfies the object detection accuracy requirements in the IoV context. It enables the number of successfully connected users to approach the total user count, and increases the service rate by up to 34%, thereby enhancing driving safety, stability, and efficiency.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Rodriguez-Colina, Enrique, Ricardo Marcelín-Jiménez, Leonardo Palacios-Luengas y Michael Pascoe-Chalke. "System Design for Opportunistic Spectrum Access Using Statistical Decision-Making and Coded-MAC". Wireless Communications and Mobile Computing 2020 (22 de octubre de 2020): 1–15. http://dx.doi.org/10.1155/2020/8816760.

Texto completo
Resumen
Different mechanisms have been proposed to solve opportunistic spectrum access (OSA). In order to address spectrum management efficiently, these mechanisms can be divided into four main functionalities, spectrum sensing, decision-making, sharing, and mobility. These functionalities depend on the interpretation and adaptation of different parameters, for example, sensing and data interpretation for adaptive modulation, power adjustments, and changes regarding the range of frequency operation. For the decision-making function, a novel approach is proposed in which coding information is added to the establishment of the communication process thus assisting the medium access control (MAC). The presence of cognitive radio devices in the network coverage range can be controlled or coordinated by using specific redundancy codes. Hence, Reed Solomon (RS) code is used in this paper as part of the handshaking process to provide error correction. In addition, a redundancy strategy based on Rabin’s information dispersal algorithm (IDA) is presented to provide fault tolerance to the communication between cognitive radio devices. In this case, the information is divided into fragments dynamically, and each fragment is coded by an RS code and reassigned to a subset of recipients using alternate paths. This work shows how to optimize spectrum access based on IDA and RS codes to diversify channel occupation without losing significant information with several frequency hops presented in cognitive radio communications. The validations were executed in a discrete event simulator developed in Python. The proposed system for OSA was found to perform better than other approaches using pilot sequences. Our proposal, therefore, provides fault tolerance, to diversify channel occupation, and helps identify the presence of primary and secondary users when a common control channel (CCC) is implemented by the optimization of the spectrum use.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Herlian, Nola Verli, Komang Oka Saputra y I. Gst A. Komang Diafari Djuni Hartawan. "Clock Skew Based Computer Identification on Different Types of Area Networks". Journal of Electrical, Electronics and Informatics 3, n.º 1 (18 de junio de 2019): 25. http://dx.doi.org/10.24843/jeei.2019.v03.i01.p05.

Texto completo
Resumen
The increase of client devices along with the growth of internet access currently affects to security threats at the user's identity. Identifiers that commonly used today, such as SSID, IP address, MAC address, cookies, and session IDs have a weakness, which is easy to duplicate. Computer identification based on clock skew is an identification method that is not easily duplicated because it is based on the hardware characteristics of the device. Clock skew is the deviation of the clock to the true time which causes each clock to run at a slightly different speed. This study aims to determine the effect of network types to the clock skew stability as a reliable device identification method. This research was conducted on five client computers which running windows and linux operating systems. The measurement was conducted based on three different types of area networks, i.e., LAN, MAN, and WAN. The skew estimation was done using two linear methods i.e., linear programming and linear regression. The measurement results show that the most stable clock skew is found on the LAN measurement because it meets the threshold tolerance limit i.e., ±1 ppm. Skew estimation using linear programming method has better accuracy than linear regression method.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Korolkov, Roman. "AN ATTACK SCENARIO USING A ROGUE ACCESS POINT IN IEEE 802.11 NETWORKS". Cybersecurity: Education, Science, Technique 3, n.º 11 (2021): 144–54. http://dx.doi.org/10.28925/2663-4023.2021.11.144154.

Texto completo
Resumen
One of the most serious security threats to wireless local area networks (WLANs) in recent years is rogue access points that intruders use to spy on and attack. Due to the open nature of the wireless transmission medium, an attacker can easily detect the MAC addresses of other devices, commonly used as unique identifiers for all nodes in the network, and implement a spoofing attack, creating a rogue access point, the so-called "Evil Twin". The attacker goal is to connect legitimate users to a rogue access point and gain access to confidential information. This article discusses the concept, demonstrates the practical implementation and analysis of the “Evil Twin” attack. The algorithm of the intruder's actions, the scenario of attack on the client, and also procedure for setting up the program-implemented rogue access point is shown. It has been proven that the implementation of the attack is possible due to the existence of several access points with the same service set identifier and MAC address in the same area, allowed by 802.11 standard. The reasons for failure operation of the network and possible interception of information as a result of the attack are identified, methods of detecting rogue access points are analyzed. During the experiment, observations of the 802.11 frames showed that there were deviations in the behavior of beacon frames at the time of the "Evil Twin" attack. First, the number of beacon frames coming from the access point which succumbed to the attack is increasing. Secondly, the traffic analyzer detected significant fluctuations in the values of the received signal level, which simultaneously come from a legitimate and rogue access point, which allows to distinguish two groups of beacon frames. The "Evil Twin" attack was implemented and researched using Aircrack-ng – a package of software for auditing wireless networks, and Wireshark – network traffic analyzer. In the future, the results obtained can be used to improve methods of protection against intrusion into wireless networks, in order to develop effective systems for detecting and preventing intrusions into WLAN.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Nguyen, Duc-Thang y Taehong Kim. "An SDN-Based Connectivity Control System for Wi-Fi Devices". Wireless Communications and Mobile Computing 2018 (24 de julio de 2018): 1–10. http://dx.doi.org/10.1155/2018/9359878.

Texto completo
Resumen
In recent years, the prevalence of Wi-Fi-enabled devices such as smartphones, smart appliances, and various sensors has increased. As most IoT devices lack a display or a keypad owing to their tiny size, it is difficult to set connectivity information such as service set identifier (SSID) and password without any help from external devices such as smartphones. Moreover, it is much more complex to apply advanced connectivity options such as SSID hiding, MAC ID filtering, and Wi-Fi Protected Access (WPA) to these devices. Thus, we need a new Wi-Fi network management system which not only facilitates client access operations but also provides a high-level authentication procedure. In this paper, we introduce a remote connectivity control system for Wi-Fi devices based on software-defined networking (SDN) in a wireless environment. The main contributions of the proposed system are twofold: (i) it enables network owner/administrator to manage and approve connection request from Wi-Fi devices through remote services, which is essential for easy connection management across diverse IoT devices; (ii) it also allows fine-grained access control at the device level through remote control. We describe the architecture of SDN-based remote connectivity control of Wi-Fi devices. While verifying the feasibility and performance of the proposed system, we discuss how the proposed system can benefit both service providers and users.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Shuai, Yin y A. S. Yuschenko. "Dialogue System of Controlling Robot Based on the Theory of Finite-State Automata". Mekhatronika, Avtomatizatsiya, Upravlenie 20, n.º 11 (7 de noviembre de 2019): 686–95. http://dx.doi.org/10.17587/mau.20.686-695.

Texto completo
Resumen
The article discusses the system of dialogue control manipulation robots. The analysis of the basic methods of automatic speech recognition, speech understanding, dialogue management, voice response synthesis in dialogue systems has been carried out. Three types of dialogue management are considered as "system initiative", "user initiative" and "combined initiative". A system of object-oriented dialog control of a robot based on the theory of finite state machines with using a deep neural network is proposed. The main difference of the proposed system lies in the separate implementation of the dialogue process and robot’s actions, which is close to the pace of natural dialogue control. This method of constructing a dialogue control robot allows system to automatically correct the result of speech recognition, robot’s actions based on tasks. The necessity of correcting the result of speech recognition and robot’s actions may be caused by the users’ accent, working environment noise or incorrect voice commands. The process of correcting speech recognition results and robot’s actions consists of three stages, respectively, in a special mode and a general mode. The special mode allows users to directly control the manipulator by voice commands. The general mode extends the capabilities of users, allowing them to get additional information in real time. At the first stage, continuous speech recognition is built by using a deep neural network, taking into account the accents and speech speeds of various users. Continuous speech recognition is a real-time voice to text conversion. At the second stage, the correction of the speech recognition result by managing the dialogue based on the theory of finite automata. At the third stage, the actions of the robot are corrected depending on the operating state of the robot and the dialogue management process. In order to realize a natural dialogue between users and robots, the problem is solved in creating a small database of possible dialogues and using various training data. In the experiments, the dialogue system is used to control the KUKA manipulator (KRC4 control) to put the desired block in the specified location, implemented in the Python environment using the RoboDK software. The processes and results of experiments confirming the operability of the interactive robot control system are given. A fairly high accuracy (92 %) and an automatic speech recognition rate close to the rate of natural speech were obtained.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Patil, Rashmi y Rekha Patil. "Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks". International journal of Computer Networks & Communications 14, n.º 4 (31 de julio de 2022): 81–98. http://dx.doi.org/10.5121/ijcnc.2022.14405.

Texto completo
Resumen
For creating a mobile network, the moving cars consider as nodes in the Vehicular Ad-Hoc Networks (VANETs). Each participating car is turned into a wireless router in the VANETs that allows the connecting and creating a network. To improve the comfort and safety of driving of automotive users, the vehicular environment system develops in the vehicular environment systems using the wireless access. The channel congestion causes the degradation of quality of service in such cases with higher vehicle density. The real-time and reliable communication is required for various safety applications of VANETs. The dense traffic network has included one of the major challenges as avoiding the communication channels’ degradation. To provide the network with efficient operation, most of the studies are recommended to use the appropriate congestion control methods. It’s important to note that many congestion control mechanisms are not implemented for event-driven real-time safety messages. Based on the congestion probability approach estimation, CFRS-CP-Congestion free route selection is introduced for minimizing the total number of data flow packets that passing through the congested nodes. At each node, the congestion probability is estimated using the proposed technique of CFRS-CP based on link quality, MAC overhead, neighbour density & vehicle velocity. Then, the estimated congestion probability is used for route assessment. The estimated probability value is appended to the control packets for comparison. All the available routes are assessed based on the estimated congestion probability which results in congestion free routing path for every round of data communication. The simulation results prove that the proposed method decreases end to end delay by 32% and improves PDR up to 30% and throughput up to 45% compared to the existing protocols.
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Brito, Celene. "Evaluation of circular skills and circular mind-set of consumers with the use of it - case study in a sample of consumers in northeast Brazil compared to a sample of internal stakeholders of an industry in transition to the circular economy". International Journal of Complementary & Alternative Medicine 16, n.º 5 (26 de octubre de 2023): 285–89. http://dx.doi.org/10.15406/ijcam.2023.16.00664.

Texto completo
Resumen
The circular economy concept has spread around the world, including Europe and Latin America. It is defined as a concept that led to a rethinking of economic and sustainable practices today and is inspired by the functioning of ecosystems and nature. It is innovation and design that are inseparable from products and systems, in the context of sustainable development. It is based on the principle of “closing the life cycle” of products, allowing a reduction in the consumption of raw materials, energy, and water. It promotes the development of new relationships between companies, which become consumers and suppliers of materials and are reincorporated into the production cycle. Several Circular Economy goals have already been achieved in the field of research, science, and technology. Numerous studies and efforts have been performed in the scientific and technological area for searching solutions to overcome legal, regulatory, political and technological barriers posed by several institutions; among them, the pioneering Ellen Mac Arthur Foundation has been joining efforts over the years in improving the conception and operation of the circular economy, applied to industrial processes and production chains, as well as in the structuring of new technological ecosystems. For every achievement, new challenges arise for the Circular Economy, which now needs to gain the trust of managers, politicians, investors, and entrepreneurs to initiate, plan and manage the circular economy in industry and companies. Consumers present challenges that need to be overcome by offering differentiated products and services. The objective of the work reported here was to identify mental and cultural barriers, which can generate various obstacles to the development of Circular Economy and Environmental Social Governance (ESG, such as climate change, pollution, and human resource management) issues and find ways and guidelines to resolve the problem. When investigating mentality, culture and skills for the Circular Economy, there are several possibilities to contribute to the construction of knowledge applied to the reality of companies and consumers, carrying out pilot studies in Industries with the method expressly created and oriented towards the “integrated assessment of competence", with the objective of planning and implementing the circular economy. It is based on the identification of mental models, on psychological aspects that are in line with the transition to the Circular Economy.” This method is reported here and has been used to collect data for the author's doctoral thesis. As a tool, the information platform was used, with FlashPlayHR® software (www.flashplayhr.com.br/#). bilingual, in Portuguese and English, and was developed with the aim of helping leaders, employees and stakeholders to better understand the complex systems developed through innovation in the Circular Economy. It is based on the assessment of mental models from linear to circular, as well as in identifying skills to operate with circular models. The case studies presented here included an electronics recovery and recycling industry located in São Paulo – Brazil in 2022 and a group of internet users. The study defines circular guidelines based on mindset, generating data for systemic, tactical, and operational planning, with interaction between technology and humans. The method provided the mapping/diagnosis of each employee and the organization's human system, defining the stages of the process “from linear to circular,” generating content for conducting systemic planning. One of the fundamental aspects of the method is to support the strategic human resources area of organizations, providing conditions for creating constructive interaction and integration with other areas of the industry to build a Systemic Corporate Governance Model., in addition to data and content for the development of circular programs and actions. The systems view becomes preponderant and fundamental for planning. The method/software was applied to two groups of people: one more focused on circular economy in the context of an electronic recovery industry, and another more distant from circular economy concepts, formed by Internet users. The methodology applied to the electronic retrieval industry and a random group of Internet users is reported here in detail. It was possible to identify the “linear to circular” stage of the industry to achieve the circular model.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Jain, Lalit. "Computer Network: An Implementation of MAC Spoofing". International Journal of Engineering and Computer Science 12, n.º 05 (16 de mayo de 2023): 25717–21. http://dx.doi.org/10.18535/ijecs/v12i05.4733.

Texto completo
Resumen
An exponential growth has observed of network or internet users due to diverse resource and information sharing services. Contrary, network uses also increased in different kinds of attacks. Means network is vulnerable for many types of attacks. Computer network may exploit in different contexts such as denial of service, ping death, malfunction routing, flooding, man in the middle and spoofing attack. Among of these MAC spoofing is kind of attack spoofing attack that target to MAC or physical address of the network host or router. It tampers original address to any other random or user defined address. The aim of the study is to present MAC address and its types. With this, MAC spoofing attack also presented. Implementation environment and method for the MAC spoofing also presented. MAC spoofing is implemented in the KALI Linux operating system with the help of MACCHANGER tool.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Ma, Yue Huai, Wei Zhang, Wen Hua Wang y Yue Xuan Liu. "An Efficient Packet Scheduling and Resource Allocation Algorithm for Practical Multi-Layer Systems". Advanced Materials Research 926-930 (mayo de 2014): 2951–54. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2951.

Texto completo
Resumen
In this paper, we research the wireless resource allocation problem with packet scheduling in both MAC layer and physical layer in multi-user orthogonal frequency division multiplexing (OFDM) systems. Under the practical environment where mobile users receiving signal with different SNR levels in a cell or around a Wi-Fi hot spot, our designed algorithm can execute relatively fair packet scheduling from MAC layer consideration and make efficient use of wireless resources at physical layer. simulation results show that our proposed scheme satisfy most users in various SNR and have better average performance in packet drop rate, packet delay and total throughput.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي, سامي العيساوي، ورضا سلامة، وعبدالرحمن الطلحي. "Intrusion Detection System for Misbehaving WLAN Users". journal of king abdulaziz university computing and information technology sciences 1, n.º 1 (2 de enero de 2012): 55–81. http://dx.doi.org/10.4197/comp.1-1.3.

Texto completo
Resumen
Wireless networks in the lives of people at work, at home, and in public places, plays a decisive role. Given the widespread demand for wireless networks, providers deploy wireless local area networks (WLAN) to provide access to broadband Internet Within the range of a public wireless LAN hotspot such as in airports or hotels, users can access their e-mails and browse the Internet either for free or, most often, against a fee. However, as the number of users rises, so does the risk that users may misbehave. Misbehaving users can to a large extent increase their share of bandwidth at the expense of other paid users by slightly modifying the driver of the network adapter. As the use of such networks grows, users will demand secure yet efficient, low-latency communications. Intruders’ detection is one of the key techniques that can be used to protect a network against outsiders. Many Intrusion Detection Systems (IDSs) have been designed for wired networks. Unfortunately, most of these IDSs do not give the expected results when used with wireless networks and are especially poor at addressing the Media Access Control (MAC) layer problem. In this sheet, we present the design and implementation of an IDS tool that is chosen for WLANs and addresses misbehavior at the MAC layer properly. Keywords: IDS, WLAN, MAC layer, Misbehavior
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Subramanyam, Radha, S. Rekha, P. Nagabushanam y Sai Krishna Kondoju. "Optimization Techniques in Cooperative and Distributed MAC Protocols". International Journal of Intelligent Information Technologies 20, n.º 1 (7 de enero de 2024): 1–23. http://dx.doi.org/10.4018/ijiit.335523.

Texto completo
Resumen
The tremendous increase in wireless network application finds distributed allocation of resources allocation very useful in the network. Packet delivery ratio and delay can be improved by concentrating on payload size, mobility, and density of nodes in the network. In this article, a survey is carried out on different cooperative and distributed MAC protocols for communication and optimization algorithms for various applications and the mathematical issues related to game theory optimizations in MAC protocol. Spatial reuse of channel improved by (3-29) % and multi-channel improves throughput by 8% using distributed MAC protocol. The energy utility of individual players can be focused to get better network performance with NASH equilibrium. Fuzzy logic improves channel selection by 17% and secondary users' involvement by 8%. Jamming, interference problems can be addressed using cross layer approach in the MAC and simultaneous data, voice transmissions in IoT; WSN applications can be attained using hybrid distributed MAC protocol.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

K, ARUNADEVI y PADMAKUMARI O. "Evaluation of different filter materials used in drip irrigation systems". Madras Agricultural Journal 91, March (2004): 15–18. http://dx.doi.org/10.29321/maj.10.a00058.

Texto completo
Resumen
Emitter plugging is the major problem faced by drip irrigation users. To avoid plugging of emitters, proper operation and maintenance of filtration and chlorination is essential. A screen mesh filter can benefit a drip irrigation system's operation if properly used. The performance of screen filter is dependent on the maintenance it receives and the conditions under which it must operate. In order to assess the filter performance, pressure drop, filtration rate, turbidity reduction, filtration efficiency parameters were studied. From the study, the maximum filtration efficiency was observed in case of steel wire mesh of 120 size.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Moruf Adedeji, Adeagbo, Agbaje Halimah Adebimpe y Kasali Abdulwakil Adekunle. "Data Visualization Analytic for Understanding the Dynamics of Operating System Using Programming Language Paradigm". International Journal of Data Science 3, n.º 1 (30 de junio de 2022): 19–24. http://dx.doi.org/10.18517/ijods.3.1.19-24.2022.

Texto completo
Resumen
Evolution of Programming Languages lead to the emergence of new one while the old one slowly fade away. The choice of most developer on Operating System depends on the Programming Language to execute a project. This infer that there is a connection between Programming Languages and Operating System. Hence, this study proposes a data visualization analytic to observe the trend of programming language usages over the years and their effects on Operating Systems. Dataset containing the usage of Programming Languages and Operating System were retrieved from GitHub, Flourish and Stack overflow using text mining that employed regex techniques and Python was used to implement data analytic and visualization. Considering the first ten popular Programming Languages from 330,936 instances, our result similar to the result of other research output with Python leading the Programing Languages. The result of change over time of Operating System shows that Window OS is tending toward negative path while Linux OS and Mac OS are tending toward positive path. Also, Java and JavaScript are mostly used on Window OS, Objective C and Swift are mostly used on Mac OS and Python is mostly used on Linux. The overall results over the years showed that programmers are consistently shifting from Window OS to Linux OS and Mac OS
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Muyu, Ronaldo, Christy Poluakan y Undap E. B. Yeremia. "Understanding Usability Test of Operating Systems in University: Evidence from Indonesia". International Journal of Information Technology and Education 1, n.º 2 (24 de marzo de 2022): 1–7. http://dx.doi.org/10.62711/ijite.v1i2.29.

Texto completo
Resumen
The operating system is the most important computer system software. Currently, there are several operating systems that are so popular, including Windows and macOS. Usability measurements were made between the Windows and macOS operating systems. This study aims to measure the comparison of usage between Windows and Mac operating systems in lectures at the University. This study used a questionnaire with 13 questions asked and 250 respondents received, then analyzed the data using a Guttman measuring scale. The results show that the Windows operating system is more widely used with a much higher percentage than MacOS. The results of this study also prefer the Windows operating system with 84.61% while MacOS with 11.38%. Because starting in terms of popularity among university students, many use Windows because it is considered easier and the applications provided for free are different from prepaid MacOS
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Skowroński, Rafał y Jerzy Brzeziński. "UI dApps Meet Decentralized Operating Systems". Electronics 11, n.º 19 (22 de septiembre de 2022): 3004. http://dx.doi.org/10.3390/electronics11193004.

Texto completo
Resumen
The advent of Ethereum opened up a pandora box of decentralized possibilities. While allowing for the replicated, decentralized computation of Turing-complete instructions, platforms such as Ethereum do not offer the possibility of direct, interactive, real-time processing of users’ inputs that could later affect the decentralized state machine. They cannot directly observe, replicate and authenticate users’ actions performed in real-time while presenting the results of these. They lack mechanics that would incentivize full-nodes to provide low-latency-constrained services to users in-between epochs of a decentralized state machine, thus pushing dApps’ developers towards hybrid architectures—ones employing centralized servers while not even considering certain applications, due to the aforementioned limitations. In this research paper, we explore our results of an attempt to create a ‘decentralized operating system’ user experience a reality. We propose an architecture which solves the problems of the responsiveness and finalization of multiple actions performed by users in real-time—without the need for users to pre-authenticate but after having presented a single, unitary consent to commit—through the hereby proposed Deferred Authentication mechanism. To allow for this, we employ an in-house developed #GridScript programming language, used by our decentralized state machine, along with a computer-vision-enabled and AI-aided mobile app (available for both iOS and Android). We introduce the concept of Decentralized Processing Threads (DPTs) and see how these enable fascinating possibilities. In addition, we look into how Access-Control-Lists (ACLs)-enabled, incentivized storage, incentivized Sybil-proof communication, embedded firewall apparatus, integrated off-the-chain payments, and crypto-incentivized off-the-chain storage aid such a system and thus render it as feasible. We highlight various interesting troubles we have encountered, such as state recovery after disconnects of the UI and the replication of its state across both nodes maintaining the network and web browsers. We depict ‘off-the-chain’ mechanics, which we use to reward for real-time services provided to users by nodes maintaining the network. We tackle crypto-incentivized WebRTC swarms not needing centralized servers for signaling. We look into a user-friendly approach to Non-Fungible Tokens (NFTs). The test-bed is readily available with multiple functional UI dApps already in place. Indeed, the paper presents UI and UX design decisions we have undertaken based on conclusions from statistical research results on a group of 50,341 volunteers over 4 years, which we have used to formulate what we codenamed as the Venice UI/UX design paradigm. We extend upon the notion of Token Pools to allow for the Sybil-proof incentivization of multiple-peers from a single data structure stored on the decentralized state machine.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Biswas, Abhijit y Dushyanta Dutta. "Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol". International Journal of Information Security and Privacy 16, n.º 2 (1 de abril de 2022): 1–18. http://dx.doi.org/10.4018/ijisp.308311.

Texto completo
Resumen
It is projected that communication among cognitive machine-to-machine (M2M) in smart grid networks is necessary and vital in forthcoming years. The objective of this paper is to bring out the significance of cognitive medium access control (MAC) protocol focusing on the distinctive characteristics of the devices in M2M and requirements of the smart grid communication. Therefore, developing a cognitive radio system which supports dynamic access to the spectrum available that is recently considered as a novel solution for extending wireless systems. In this paper, MAC layer sensing approaches in cognitive radio networks are investigated by considering both proactive and reactive sensing. To evaluate the performance, analytical modeling and simulation studies are carried out by comparing with state of art methods. As a result, the proposed HCM2M-MACachieves 687.3 kbps of blocking probability, 368.6kbps of dropping probability, 96.4% bandwidth utilization, 67.3% end to end delay and 89.3% of throughput.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Songzuo, Liu, Basit Iqbal, Imran Ullah Khan, Niaz Ahmed, Gang Qiao y Feng Zhou. "Full Duplex Physical and MAC Layer-Based Underwater Wireless Communication Systems and Protocols: Opportunities, Challenges, and Future Directions". Journal of Marine Science and Engineering 9, n.º 5 (27 de abril de 2021): 468. http://dx.doi.org/10.3390/jmse9050468.

Texto completo
Resumen
Underwater wireless communication has gained a great deal of attention in the last couple of decades because of its applications in the military, industrial, and monitoring sectors. Despite the extreme physical and MAC layer difficulties, acoustics are used for various applications among the various modes of underwater communication technologies used. While significant research efforts have been made to address these issues, the bottleneck remains in achieving high bandwidth, high throughputs, and data rate. Researchers have begun to look into full duplex (FD) implementation to improve bandwidth efficiency and increase data rate and throughput. Users can send and receive data simultaneously over the FD links, maximizing bandwidth utilization and increasing throughput. As a result, we thoroughly reviewed various FD physical layered UWAC systems and MAC layered protocols for underwater communication. The various problems that the aforementioned systems and protocols have faced, as well as the solutions suggested in previous works to solve each problem, are also highlighted. Various metrics are used to compare the performance of various physical layered FD systems and FD MAC protocols. We also explore some of the open research questions in these FD-physical layered and MAC layered protocols, as well as future research directions. Based on ample information, we suggest a cross-layered architecture based on various IBFD-SI cancellations, DA-CSMA, and FD-MAC protocols. This review provides a broad view of the current FD physical and MAC layered protocols based on acoustic communication, as well as recommendations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Rahim, Muddasir, Riaz Hussain, Irfan Latif Khan, Ahmad Naseem Alvi, Muhammad Awais Javed, Atif Shakeel, Qadeer Ul Hasan, Byung Moo Lee y Shahzad A. Malik. "Self-Organized Efficient Spectrum Management through Parallel Sensing in Cognitive Radio Network". Wireless Communications and Mobile Computing 2021 (6 de agosto de 2021): 1–22. http://dx.doi.org/10.1155/2021/5552012.

Texto completo
Resumen
In this paper, we propose an innovative self-organizing medium access control mechanism for a distributed cognitive radio network (CRN) in which utilization is maximized by minimizing the collisions and missed opportunities. This is achieved by organizing the users of the CRN in a queue through a timer and user ID and providing channel access in an orderly fashion. To efficiently organize the users in a distributed, ad hoc network with less overhead, we reduce the sensing period through parallel sensing wherein the users are divided into different groups and each group is assigned a different portion of the primary spectrum band. This consequently augments the number of discovered spectrum holes which then are maximally utilized through the self-organizing access scheme. The combination of two schemes augments the effective utilization of primary holes to above 95%, even in impasse situations due to heavy primary network loading, thereby achieving higher network throughput than that achieved when each of the two approaches are used in isolation. By efficiently combining parallel sensing with the self-organizing MAC (PSO-MAC), a synergy has been achieved that affords the gains which are more than the sum of the gains achieved through each one of these techniques individually. In an experimental scenario with 50% primary load, the network throughput achieved with combined parallel sensing and self-organizing MAC is 50% higher compared to that of parallel sensing and 37% better than that of self-organizing MAC. These results clearly demonstrate the efficacy of the combined approach in achieving optimum performance in a CRN.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Hardeep Singh Saini, Prabhjot Kaur,. "“Hybrid MAC Methodology for Improving the QOS in Fiber Wireless Network”". Journal of Electrical Systems 20, n.º 2s (4 de abril de 2024): 293–305. http://dx.doi.org/10.52783/jes.1140.

Texto completo
Resumen
The Fi-Wi (Fiber-Wireless) approach stands out as a crucial element in the realm of networks, demonstrating superiority over various technologies. With the exponential growth in Internet users, significant strides have been made in the evolution of Fi-Wi networking systems in recent years. This mechanism offers broader bandwidth and network stability, ensuring high-speed connectivity with "Anytime Anywhere" availability for end users. However, the escalating energy demand in networking systems poses a constraint on the network's lifespan, impacting transmission. Over the years, researchers have proposed and tested various Media Access Control (MAC) protocols to address transmission and energy consumption issues. Despite these efforts, existing protocols have encountered challenges such as overheating, delays, throughput issues, and collisions. This research paper introduces a combination of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA) to tackle associated challenges. The primary objective is to enhance throughput and reduce delays in Fi-Wi networks. To achieve this goal, the study employs techniques that involve and Utilizing an Orthogonal Frequency Division Multiplexing (OFDM) modulator, a free-space optical (FSO) communication channel, an OFDM demodulator, and Opti-system for the analysis and enhancement of received signals, our study demonstrates that the proposed MAC protocol surpasses conventional MAC protocols in terms of delay, data throughput, and transmission efficiency.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Hardeep Singh Saini, Prabhjot Kaur ,. "“Hybrid MAC Methodology for Improving the Qos in Fiber Wireless Network”". Journal of Electrical Systems 20, n.º 1s (28 de marzo de 2024): 819–32. http://dx.doi.org/10.52783/jes.824.

Texto completo
Resumen
The Fi-Wi (Fiber-Wireless) approach stands out as a crucial element in the realm of networks, demonstrating superiority over various technologies. With the exponential growth in Internet users, significant strides have been made in the evolution of Fi-Wi networking systems in recent years. This mechanism offers broader bandwidth and network stability, ensuring high-speed connectivity with "Anytime Anywhere" availability for end users. However, the escalating energy demand in networking systems poses a constraint on the network's lifespan, impacting transmission. Over the years, researchers have proposed and tested various Media Access Control (MAC) protocols to address transmission and energy consumption issues. Despite these efforts, existing protocols have encountered challenges such as overheating, delays, throughput issues, and collisions. This research paper introduces a combination of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA) to tackle associated challenges. The primary objective is to enhance throughput and reduce delays in Fi-Wi networks. To achieve this goal, the study employs techniques that involve and Utilizing an Orthogonal Frequency Division Multiplexing (OFDM) modulator, a free-space optical (FSO) communication channel, an OFDM demodulator, and Opti-system for the analysis and enhancement of received signals, our study demonstrates that the proposed MAC protocol surpasses conventional MAC protocols in terms of delay, data throughput, and transmission efficiency.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Perel, Efrat y Uri Yechiali. "FINITE TWO LAYERED QUEUEING SYSTEMS". Probability in the Engineering and Informational Sciences 30, n.º 3 (18 de mayo de 2016): 492–513. http://dx.doi.org/10.1017/s0269964816000139.

Texto completo
Resumen
We study layered queueing systems comprised two interlacing finite M/M/• type queues, where users of each layer are the servers of the other layer. Examples can be found in file sharing programs, SETI@home project, etc. Let Li denote the number of users in layer i, i=1, 2. We consider the following operating modes: (i) All users present in layer i join forces together to form a single server for the users in layer j (j≠i), with overall service rate μjLi (that changes dynamically as a function of the state of layer i). (ii) Each of the users present in layer i individually acts as a server for the users in layer j, with service rate μj.These operating modes lead to three different models which we analyze by formulating them as finite level-dependent quasi birth-and-death processes. We derive a procedure based on Matrix Analytic methods to derive the steady state probabilities of the two dimensional system state. Numerical examples, including mean queue sizes, mean waiting times, covariances, and loss probabilities, are presented. The models are compared and their differences are discussed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Um, Myoung-Yong. "Smartphone Users Characteristics According to Differences between Operating Systems". Journal of Digital Convergence 12, n.º 9 (28 de septiembre de 2014): 93–99. http://dx.doi.org/10.14400/jdc.2014.12.9.93.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Martin, Jeremy, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes y Sam Teplov. "Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol". Proceedings on Privacy Enhancing Technologies 2019, n.º 4 (1 de octubre de 2019): 34–53. http://dx.doi.org/10.2478/popets-2019-0057.

Texto completo
Resumen
Abstract We investigate Apple’s Bluetooth Low Energy (BLE) Continuity protocol, designed to support interoperability and communication between iOS and macOS devices, and show that the price for this seamless experience is leakage of identifying information and behavioral data to passive adversaries. First, we reverse engineer numerous Continuity protocol message types and identify data fields that are transmitted unencrypted. We show that Continuity messages are broadcast over BLE in response to actions such as locking and unlocking a device’s screen, copying and pasting information, making and accepting phone calls, and tapping the screen while it is unlocked. Laboratory experiments reveal a significant flaw in the most recent versions of macOS that defeats BLE Media Access Control (MAC) address randomization entirely by causing the public MAC address to be broadcast. We demonstrate that the format and content of Continuity messages can be used to fingerprint the type and Operating System (OS) version of a device, as well as behaviorally profile users. Finally, we show that predictable sequence numbers in these frames can allow an adversary to track Apple devices across space and time, defeating existing anti-tracking techniques such as MAC address randomization.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Quang, Khanh Nguyen, Van Duc Nguyen y Hyunseung Choo. "Dynamic Subchannel Assignment-Based Cross-Layer MAC and Network Protocol for Multihop Ad Hoc Networks". Journal of Computer Networks and Communications 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/962643.

Texto completo
Resumen
The paper presents a dynamic subchannel assignment algorithm based on orthogonal frequency division multiple access technology operating in the time division duplexing and a new cross-layer design based on a proposed routing protocol jointed with the MAC protocol. The proposed dynamic sub-channel assignment algorithm provides a new interference avoidance mechanism which solves several drawbacks of existing radio resource allocation techniques in wireless networks using OFDMA/TDD, such as the hidden node and exposed node problems, mobility, and cochannels interference in frequency (CCI). Besides, in wireless networks, when a route is established, the radio resource allocation problems may decrease the end to end performance proportionally with the length of each route. The contention at MAC layer may cause the routing protocol at network layer to respond by finding new routes and routing table updates. The proposed routing protocol is jointed with the MAC protocol based on dynamic sub-channel assignment to ensure that the quality of service in multihop ad hoc networks is significantly improved.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Suleesathira, Raungrong y Jansilp Aksiripipatkul. "Selective decoding schemes and wireless MAC operating in MIMO ad hoc networks". Journal of Communications and Networks 13, n.º 5 (octubre de 2011): 421–27. http://dx.doi.org/10.1109/jcn.2011.6112298.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Perković, T., A. Dagelić, M. Bugarić y M. Čagalj. "On WPA2-Enterprise Privacy in High Education and Science". Security and Communication Networks 2020 (7 de septiembre de 2020): 1–11. http://dx.doi.org/10.1155/2020/3731529.

Texto completo
Resumen
A plethora of organizations, companies, and foremost universities and educational institutions are using WPA2-Enterprise protocol to allow their end-users to connect to provided Wi-Fi networks. When both the provider’s and the end-user’s devices are configured properly, it is considered one of the safest Wi-Fi connection protocols with the added benefits of having a unique password for every Wi-Fi user. However, a known evil twin attack can be performed to steal users’ Wi-Fi login credentials, if the devices are not configured correctly. Considering the widespread use of Wi-Fi-enabled smartphones and rising concerns regarding users’ privacy, we focus on the privacy aspects of WPA2-Enterprise vulnerabilities mainly on the widespread Eduroam network. We show that device deanonymization is a concerning liability of many Eduroam networks. More than 87% of 1650 devices collected during a two-month test on our university are vulnerable to MAC address deanonymization attack. Furthermore, by analyzing the Eduroam Configuration Assistant Tool of 1066 different institutions around the world, 67% of exported Eduroam profiles having the Wi-Fi device reveal the user’s identity in the clear, thus linking the users with the device’s MAC address. Indeed, the analysis of the configuration profiles has been confirmed by performing the deanonymization attack on a large-scale international music festival in our country, where 70% of the devices have been vulnerable. Additionally, we showcase the psychological aspects of secure Eduroam users, where some are willing to modify secure configuration profiles to gain aspects to certain blocked features. As a result, the attacker is granted with user credentials and IMSI number and provided with access to all Eduroam-related services.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Perzyński, Tomasz, Daniel Pietruszczak y Gracjan Ziółek. "Analysis of selected operating systems in mobile devices". AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, n.º 6 (30 de junio de 2018): 649–54. http://dx.doi.org/10.24136/atest.2018.150.

Texto completo
Resumen
The paper presents a comparative analysis of selected operating systems in mobile devices, using smartphones: iPhone 6s and Samsung models from the Galaxy series. The study used freeware applications. It allowed to analysis and compare the devices parameters in users environment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Tarafder, Pulok y Wooyeol Choi. "MAC Protocols for mmWave Communication: A Comparative Survey". Sensors 22, n.º 10 (19 de mayo de 2022): 3853. http://dx.doi.org/10.3390/s22103853.

Texto completo
Resumen
With the increase in the number of connected devices, to facilitate more users with high-speed transfer rate and enormous bandwidth, millimeter-wave (mmWave) technology has become one of the promising research sectors in both industry and academia. Owing to the advancements in 5G communication, traditional physical (PHY) layer-based solutions are becoming obsolete. Resource allocation, interference management, anti-blockage, and deafness are crucial problems needing resolution for designing modern mmWave communication network architectures. Consequently, comparatively new approaches such as medium access control (MAC) protocol-based utilization can help meet the advancement requirements. A MAC layer accesses channels and prepares the data frames for transmission to all connected devices, which is even more significant in very high frequency bands, i.e., in the mmWave spectrum. Moreover, different MAC protocols have their unique limitations and characteristics. In this survey, to deal with the above challenges and address the limitations revolving around the MAC layers of mmWave communication systems, we investigated the existing state-of-the-art MAC protocols, related surveys, and solutions available for mmWave frequency. Moreover, we performed a categorized qualitative comparison of the state-of-the-art protocols and finally examined the probable approaches to alleviate the critical challenges in future research.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Cho, Chaeho, Yeonsang Seong y Yoojae Won. "Mandatory Access Control Method for Windows Embedded OS Security". Electronics 10, n.º 20 (12 de octubre de 2021): 2478. http://dx.doi.org/10.3390/electronics10202478.

Texto completo
Resumen
The Windows Embedded operating system (OS) adopts a discretionary access control (DAC)-based policy, but underlying vulnerabilities exist because of external hacker attacks and other factors. In this study, we propose a system that improves the security of the Windows Embedded OS by applying a mandatory access control (MAC) policy in which the access rights of objects, such as files and folders, and subjects’ privileges, such as processes, are compared. We conducted access control tests to verify whether the proposed system could avoid the vulnerabilities of DAC-based systems. Our results indicate that the existing DAC-based security systems could be neutralized if a principal’s security policy is removed. However, in the proposed MAC-based Windows Embedded OS, even if the clearance and category values of a subject’s files are given the highest rating, all accesses are automatically denied. Therefore, the execution of all files that were not previously registered on the whitelist was denied, proving that security was improved relative to DAC-based systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Ceballos, Henry Zárate y Jorge Eduardo Ortiz Triviño. "S.O.V.O.R.A.: A Distributed Wireless Operating System". Information 11, n.º 12 (14 de diciembre de 2020): 581. http://dx.doi.org/10.3390/info11120581.

Texto completo
Resumen
Due to the growth of users and linked devices in networks, there is an emerging need for dynamic solutions to control and manage computing and network resources. This document proposes a Distributed Wireless Operative System on a Mobile Ad-hoc Network (MANET) to manage and control computing resources in relation to several virtual resources linked in a wireless network. This prototype has two elements: a local agent that works on each physical node to manage the computing resources (e.g., virtual resources and distributed applications) and an orchestrator agent that monitors, manages, and deploys policies on each physical node. These elements arrange the local and global computing resources to provide a quality service to the users of the Ad-hoc cluster. The proposed S.O.V.O.R.A. model (Operating Virtualized System oriented to Ad-hoc networks) defines primitives, commands, virtual structures, and modules to operate as a distributed wireless operating system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Adekotujo, Akinlolu, Adedoyin Odumabo, Ademola Adedokun y Olukayode Aiyeniko. "A Comparative Study of Operating Systems: Case of Windows, UNIX, Linux, Mac, Android and iOS". International Journal of Computer Applications 176, n.º 39 (15 de julio de 2020): 16–23. http://dx.doi.org/10.5120/ijca2020920494.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía