physical address
Recently Published Documents


TOTAL DOCUMENTS

35
(FIVE YEARS 8)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
Vol 2115 (1) ◽  
pp. 012036
Author(s):  
K Agrawal ◽  
M K Nigam ◽  
S Bhattacharya ◽  
G Sumathi

Abstract Ambulance Detection using Image Processing and Neural Network is a vehicle detection and tracking system, which recognizes the vehicle (i.e., Ambulance in this case) amidst the traffic congestion. Due to the fact from past few years, the range of vehicles usage of the road is growing each day that results in traffic congestion, for better management of this traffic this system is useful. Traffic Congestion, as mentioned above, can be observed at an ever-growing pace in countries like India and Thailand, where the roads’ width and length make it impossible to make a separate lane for the emergency vehicle (like that of ambulance); Hence making it hard for the vehicle to pass through the traffic at the earliest possible time. The Ambulance tracking system is activated at the mapped junctions and that program detects the ambulance coming close to it and turns the traffic light to Green for the next 15 seconds. Geocoding is the practice of transforming addresses (like a physical address) to location information (like longitude and latitude) that can be used to locate a label on a map or to mark a grid. They plan to provide ambulances with this software to make it easy to transform addresses into a programmable format for review and retrieval. This data is converted to a system that shows all the crossings it must pass to meet the endpoint.


Author(s):  
Balaraju J. ◽  
P.V.R.D. Prasada Rao

This paper proposes a novel node management for the distributed system using DNA hiding and generating a unique key by combing a unique physical address (MAC) of node and hostname. This mechanism provides better node management for the Hadoop cluster providing adding and deletion node mechanism by using limited computations and providing better node security from hackers. The objective of this paper is to design an algorithm to implement node-sensitive data hiding using DNA sequences and provide security to the node and its data from hackers.


2020 ◽  
Vol 17 (1) ◽  
pp. 83-94
Author(s):  
Milica Matic ◽  
Milan Tucic ◽  
Marija Antic ◽  
Roman Pavlovic

This paper presents one approach to improve smart home user experience, by providing location-based services. Within the cloud of the existing smart home solution, the geolocation micro-service is first implemented. This micro-service communicates with third party online geolocation service to obtain latitude and longitude values from physical address and vice versa. The geolocation micro-service is used by different services to provide location-based experience. For example, weather micro-service uses the geolocation information, to provide weather content, while the traffic service monitors traffic conditions in the vicinity of the household. This information can be used to setup different automation rules in the system.


Author(s):  
Y. I. Klimiankou

This paper focuses on the Translation Lookaside Buffer (TLB) management as part of memory management. TLB is an associative cache of the advanced processors, which reduces the overhead of the virtual to physical address translations. We consider challenges related to the design of the TLB management subsystem of the OS kernel on the example of the IA-32 platform and propose a simple model of complete and consistent policy of TLB management. This model can be used as a foundation for memory management subsystems design and verification.


2019 ◽  
Vol 8 (3) ◽  
pp. 2432-2436

In today’s world the computer network communication increases the efficiency most of the organizations. Hence threats have been increased due to these online transactions/communications. These threats necessitate the researchers to improve the existing security protocols and /or develop the new ones. Authentication Protocols are one of the same which can provide the authentication, confidentiality & integrity. For checking the authenticity of messages exchange process in authentication protocols BAN logic is used. The Kerberos encrypt the information for authentications. Many organizations use it and it has five versions and versions 4 and 5 are latest. In one of over previous paper we have generalized the ticket exchange process of version 5. In this paper to make it more authenticated some modifications are proposed to both BAN and Kerberos and we defined them as R- Kerberos & RBAN. To achieve this, we have added participant’s physical address (MAC Address) as it is unique to every network adapter and can be used as our secret key.


Nowadays networks are becoming credential due to its robustness, reliability and flexibility. It got evolved with the high latency networks comprises of several workstations. Many routed protocols like IP and IPv6 are responsible to transmit the data traffic across remote network. Another factor in allocating logical address is to identify the physical address of the host in the local network. It is mandatory to allocate the IP address to transmit the data in the network. This cause the intruders to trespass into the network. They are classified as many types but we are dealing with spoofers. Our intention is to identify the spoofer’s location and to eradicate them by using overlay network. In this paper, we will discuss about the existing works and our proposed method.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 473
Author(s):  
B Bala Bharathi ◽  
E Suresh Babu

Detecting and defending against insider and outsider threats seems to be a major challenge for information security system. such that cyber-attacks pose a silent threat for a company with a havoc likely to be in billions, besides slaughtering investor confidence and denting brand image. Long-established and ongoing solutions target mainly to assimilate many known threats in the form of consistent information such as logical & physical address, etc. into detection and blocking techniques. Our proposed solution elongates forward by using Cyber threat intelligence (CTI) which is used to inform decisions timely regarding subject response to the menance or hazard, where the vulnerable systems are identified using honeypot, through integration of logs for detecting network, host intrusions using SIEM technology which would efficiently manage the occurrence of threat by using cyber hazard management to mitigate the cyber threat actions, fortify incident response efforts and enhance your overall security posture.  


2017 ◽  
Vol 14 (2) ◽  
pp. 369-392
Author(s):  
Kyosung Jeong ◽  
Sungchae Lim ◽  
Kichun Lee ◽  
Sang-Wook Kim

Thanks to remarkably fast random reads and rapidly decreasing prices per bit, flash storage has been regarded as a promising alternative to traditional hard disk drives (HDDs). Although flash storage has many distinguished hardware features, it still suffers from the poor I/O performance in the case of update operations. Due to the absence of in-place updates, differently from HDDs, flash storage needs to modify data through out-of-place updates. For this reason, it is required to continuously renew the mapping information between a logical page address and its new physical address, invalidating its old physical address. When the invalidated pages swallow most of free space in flash storage, the actions of garbage reclamation are needed. Since the actions of garbage reclamation are very costly, it is crucial to reduce the number of update operations for the use of flash storage in enterprise-scale database systems. In this light, we propose a new buffering scheme that evicts dirty pages without writing them to storage, thereby reducing the amount of update operations considerably. That is, our buffering scheme enables the flushing-less evictions of dirty pages. To correctly read a page undergoing its flushing-less eviction, we propose a new on-the-fly redo mechanism that enables restoring the lost updates of the page in normal database processing. For fast execution of the on-the-fly redo, we maintain memory-resident log data of a reasonable size. To show the performance advantages of the proposed scheme, we performed extensive experiments based on the TPC-C benchmark, by running them on the open-sourced Berkeley DB equipped with/without our scheme. The results show that our scheme yields a much better performance by reducing the amount of page updates significantly.


Sign in / Sign up

Export Citation Format

Share Document