scholarly journals Estimation of Internet Node Location by Latency Measurements - The Underestimation Problem

2015 ◽  
Vol 44 (3) ◽  
pp. 279-286 ◽  
Author(s):  
Dan Komosny ◽  
Miroslav Voznak ◽  
Kathiravelu Ganeshan ◽  
Hira Sathu

In this paper we deal with discovering a geographic location of a node in the Internet. Knowledge of location is a fundamental element for many location based applications and web services. We focus on location finding without any assistance of the node being located - client-independent estimation. We estimate a location using  communication latency measurements between nodes in the Internet. The latency measured is converted into a geographic distance which is used to derive a location by the multilateration (triangulation) principle. We analyse the latency-to-distance conversion with a consideration of location underestimation which is a product of multilateration failure. We demonstrate that location underestimations do not appear in experimental conditions. However with a real-world scenario, a number of devices cannot be located due to underestimations. Finally, we propose a modification to reduce the number of underestimations in real-world scenarios.DOI: http://dx.doi.org/10.5755/j01.itc.44.3.8353

Author(s):  
Massimo Paolucci ◽  
Gregor Broll ◽  
John Hamard ◽  
Enrico Rukzio ◽  
Matthias Wagner ◽  
...  

The last few years have seen two parallel trends emerge. The first of such trends is set by technologies such as Near Field Communication, 2D Bar codes, RFID and others that support the association of digital information with virtually every object. Using these technologies ordinary objects such as coffee mugs or advertisement posters can provide information that is easily processed. The second trend is set by (semantic) Web services that provide a way to automatically invoke functionalities across the Internet lowering interoperability barriers. The PERCI system, discussed in the chapter, provides a way to bridge between these two technologies allowing the invocation of Web services using the information gathered from the tags effectively transforming every object in a service proxy.


Author(s):  
Е.Н. Юдина

интернет-пространство стало частью реального мира современных студентов. В наши дни особенно актуальна проблема активизации использования интернета как дополнительного ресурса в образовательном процессе. В статье приводятся результаты небольшого социологического исследования, посвященного использованию интернета в преподавании социологических дисциплин. Internet space has become a part of the real world of modern students. The problem of increasing the use of the Internet as an additional resource in the educational process is now particularly topical. The article contains the results of a small sociological study on the use of the Internet in teaching sociological disciplines.


2014 ◽  
Vol 17 (6) ◽  
pp. 1301-1311 ◽  
Author(s):  
Hala S. Own ◽  
Hamdi Yahyaoui
Keyword(s):  

Author(s):  
Aditya Tepalwar ◽  
Asha Sherikar ◽  
Prajyot Mane ◽  
Vishal Fulpagare

Smart appliance design that includes multimedia intelligence to deliver comfortable, convenient, and secure personal services in the home is becoming increasingly crucial in the age of information and communication technology. This research looks at the design and execution of a novel interactive multimedia mirror system called as "smart mirror." The glass that will be used is the foundation of the design of a smart mirror. Two-way glass is suggested because it allows the visuals on the display to be seen more clearly. Our way of life has evolved to the point where making the best use of one's time is critical. Based on user surveys and prototype implementation, we propose the development of an innovative appliance that incorporates interactive information services delivered via a user interface on the surface of a mirror. Our work is based on the assumption that we all check ourselves in the mirror before leaving the house, so why shouldn't the mirror be intelligent? Smart Mirrors will eventually replace regular mirrors, providing users with both mirror and computer-assisted information services as technology improves. Because of the Raspberry Pi microcontroller cards aboard, the devices can connect to the internet, download data from the internet, and show that data on the mirror. Weather data, time and location data, current event data, and user data gathered from web services using a Raspberry Pi 3 microcontroller card are all included in the designed intelligent mirror system. The mirror will light up when the user steps in front of it. When thinking about this project, phrases like Smart Mirror, Interactive services, Raspberry Pi , and Web services come to mind.


2021 ◽  
pp. 254-267
Author(s):  
John Royce

Good readers evaluate as they go along, open to triggers and alarms which warn that something is not quite right, or that something has not been understood. Evaluation is a vital component of information literacy, a keystone for reading with understanding. It is also a complex, complicated process. Failure to evaluate well may prove expensive. The nature and amount of information on the Internet make evaluation skills ever more necessary. Looking at research studies in reading and in evaluation, real-life problems are suggested for teaching, modelling and discussion, to bring greater awareness to good, and to less good, readers.


2021 ◽  
Vol 5 (1) ◽  
pp. 28-39
Author(s):  
Minami Yoda ◽  
Shuji Sakuraba ◽  
Yuichi Sei ◽  
Yasuyuki Tahara ◽  
Akihiko Ohsuga

Internet of Things (IoT) for smart homes enhances convenience; however, it also introduces the risk of the leakage of private data. TOP10 IoT of OWASP 2018 shows that the first vulnerability is ”Weak, easy to predict, or embedded passwords.” This problem poses a risk because a user can not fix, change, or detect a password if it is embedded in firmware because only the developer of the firmware can control an update. In this study, we propose a lightweight method to detect the hardcoded username and password in IoT devices using a static analysis called Socket Search and String Search to protect from first vulnerability from 2018 OWASP TOP 10 for the IoT device. The hardcoded login information can be obtained by comparing the user input with strcmp or strncmp. Previous studies analyzed the symbols of strcmp or strncmp to detect the hardcoded login information. However, those studies required a lot of time because of the usage of complicated algorithms such as symbolic execution. To develop a lightweight algorithm, we focus on a network function, such as the socket symbol in firmware, because the IoT device is compromised when it is invaded by someone via the Internet. We propose two methods to detect the hardcoded login information: string search and socket search. In string search, the algorithm finds a function that uses the strcmp or strncmp symbol. In socket search, the algorithm finds a function that is referenced by the socket symbol. In this experiment, we measured the ability of our proposed method by searching six firmware in the real world that has a backdoor. We ran three methods: string search, socket search, and whole search to compare the two methods. As a result, all methods found login information from five of six firmware and one unexpected password. Our method reduces the analysis time. The whole search generally takes 38 mins to complete, but our methods finish the search in 4-6 min.


2016 ◽  
Vol 3 (1) ◽  
pp. 23-33
Author(s):  
Stevent Efendi ◽  
Alva Erwin ◽  
Kho I Eng

Social media has been a widespread phenomenon in the recent years. People shared a lot of thought in social media, and these data posted on the internet could be used for study and researches. As one of the fastest growing social network, Twitter is a particularly popular social media to be studied because it allows researchers to access their data. This research will look the correlation between Twitter chatter of a brand and the sales of brands in Indonesia. Factors such as sentiment and tweet rate are expected to be able to predict the popularity of a brand. Being one of the biggest industries in Indonesia, automotive industry is an interesting subject to study. A wide range of people buys vehicles, and even gather as communities based on their car or motorcycle brand preference. The Twitter results of sentiment analysis and tweet rate will be compared with real world sales results published by GAIKINDO and AISI.


Author(s):  
Rohitkumar Rudrappa Wagdarikar ◽  
Sandhya P

<p>A WS provides the communication between heterogeneous systems. While performing this operation, we need to focus on QoS of consumer, provider and registry directory. There will be some parameters like WS selection, prediction and rank these are parameters need to consider while QoS implementation in web services. While performing integration in web services we need to focus on QoS requirements regarding server and network performance. Performance of WS is related to locations i.e the network distance and the Internet connections between consumer and provider. There will be more QoS approach which works on consumers collected QoS data, based on this data system can predict the QoS of WS. Throughput and response time are the QoS of WS. In this paper, we have proposed parallel XML parser, by which we can parse UDDI, WSDL and SOAP XML files parallel by which it will improve the response time and throughput of WS.</p>


Author(s):  
Cao Liu ◽  
Shizhu He ◽  
Kang Liu ◽  
Jun Zhao

By reason of being able to obtain natural language responses, natural answers are more favored in real-world Question Answering (QA) systems. Generative models learn to automatically generate natural answers from large-scale question answer pairs (QA-pairs). However, they are suffering from the uncontrollable and uneven quality of QA-pairs crawled from the Internet. To address this problem, we propose a curriculum learning based framework for natural answer generation (CL-NAG), which is able to take full advantage of the valuable learning data from a noisy and uneven-quality corpus. Specifically, we employ two practical measures to automatically measure the quality (complexity) of QA-pairs. Based on the measurements, CL-NAG firstly utilizes simple and low-quality QA-pairs to learn a basic model, and then gradually learns to produce better answers with richer contents and more complete syntaxes based on more complex and higher-quality QA-pairs. In this way, all valuable information in the noisy and uneven-quality corpus could be fully exploited. Experiments demonstrate that CL-NAG outperforms the state-of-the-arts, which increases 6.8% and 8.7% in the accuracy for simple and complex questions, respectively.


2021 ◽  
Author(s):  
Lyndsay Roach

The study of networks has been propelled by improvements in computing power, enabling our ability to mine and store large amounts of network data. Moreover, the ubiquity of the internet has afforded us access to records of interactions that have previously been invisible. We are now able to study complex networks with anywhere from hundreds to billions of nodes; however, it is difficult to visualize large networks in a meaningful way. We explore the process of visualizing real-world networks. We first discuss the properties of complex networks and the mechanisms used in the network visualizing software Gephi. Then we provide examples of voting, trade, and linguistic networks using data extracted from on-line sources. We investigate the impact of hidden community structures on the analysis of these real-world networks.


Sign in / Sign up

Export Citation Format

Share Document