The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, the PM2.5 (particulate matter with a mean aerodynamic diameter of 2.5 micrometers or less) pollution has become a very serious problem in China. Currently, there are three types of monitoring approaches: government-led monitoring, Wireless Sensor Networks (WSN) approaches and Participatory Urban Sensing (PUS). There are three limitations in these state-of-the-art research approaches:...
Detailed energy consumption information of household appliance is meaningful for the demand side management (DSM) and home energy conservation. In this paper, a novel non-intrusive load monitoring (NILM) method is proposed for residential energy management systems(REMS). Unlike existing NILM techniques, this method works effectively with very few smart meter measurementparameters obtained at a low...
In cloud environments, Intra-VM network traffic are out of the monitor traditional physical IDS. To enable the monitor of Intra-VM network traffic, we propose cIDS, a novel cluster-based intrusion detection framework for monitoring the network traffic of cloud environments. cIDS does not require the support of physical switches and Instead of using virtualized IDS to monitor virtual network traffic,...
A wireless sensor network usually has a large amount of nodes deployed in a area to report ambient reading, to detect abnormal events, or to monitor the region. Each sensor performs several tasks, such as computing, sensing and communicating. A node equipped with multiple sensors is able to participate in many sensing tasks to improve measurement accuracy. However, the contribution a new node can...
For decades buffer overflows have been one of the most prevalent and dangerous software vulnerabilities. Although many techniques have been proposed to address the problem, they mostly introduce a very high overhead while others assume the availability of a separate system to pinpoint attacks or provide detailed traces for defense generation, which is very slow in itself and requires considerable...
visualization of real-time logistics monitoring microsystem is designed based on MEMS sensors, which are high ability, low power consumption and low cost. The MEMS acceleration sensor BMA280, the MEMS pressure sensor BMP085, the display module, the memory module and the radio frequency (RF) module are integrated in the intelligent microsystem. Intelligent microsystem block diagram is shown in Fig...
Existing VMI techniques have high overhead, and require customized introspection programs/tools for different guest OS versions - lack of generality. In this paper, we present Shadow Context, a system for close-to-real time manual-effort-free VMI. Shadow Context can meet several important real-world VMI needs which existing VMI techniques cannot. Compared to other automatic introspection tool generation...
The AUTOSAR (AUTomotive Open System ARchitecture) is an open standard in automotive industry, aiming at unifying the methodology of the automotive software development. It is drawing increasing attention because of its great concern about the safety of automotive electronics. The safety of automotive electronics greatly depends on the Operating System (OS) components, which fully implement the functionality...
Cyber analysis is a difficult task for analysts due to huge amounts of noise-abundant monitoring data and increasing complexity of the reasoning tasks. Therefore, experience from experts can provide guidance for analysts' analytical reasoning and contribute to training. Despite its great potential benefits, experience has not been effectively leveraged in the existing reasoning support systems due...
Traditional Empirical Mode Decomposition(EMD) used in insulator leakage current de-noising easily leads to mode mixing problem, the Intrinsic Mode Function with mode mixing will lost the original physical meaning. An improved ensemble EMD(EEMD) of noise-assisted data analysis method to solve the problem of mode mixing in EMDs introduced. The performance of EMD and EEMD are compared by signal simulation...
Air conditioners possess a large proportion of the energy consumption in a building for both heating and cooling functions. The purpose of this paper is to present the work in progress which uses simple and cheap sensor nodes mounting on the external unit of air conditioners to automatically sense the usage pattern. This work is part of the project called Cyber IVY, which provides means of building...
Managing workload for large scale web applications is a fundamental task for satisfactory quality of service, low management and operation cost. In this paper, we present SCOPS, a system of distributed workload management to achieve service differentiation and overload protection in such large scale deployment. Our system splits the workload management logic into distributed components on each back-end...
Current adaptation approaches mainly work in isolation and cannot be easily integrated to tackle complex adaptation scenarios. The few existing cross-layer adaptation techniques are somewhat inflexible because the adaptation process is predefined and static. In this paper we propose a methodology for the dynamic and flexible adaptation of multi-layer applications. We use events to trigger the process...
Operating system security (OS) is the basis for trust computing. As the kernel rootkits become popular and lots of kernel vulnerabilities are exposed, the OS kernel suffers a large number of attacks. It is difficult to protect the kernel by its own module because the kernel rootkits has the same ability to cripple the security module within the same kernel space. Recently, with the virtualization...
This paper describes an intelligent circuit breaker software and hardware design, real-time multi-task alarm system will be introduced into circuit breaker monitoring and control, to the timely opening and timely alarm. According to the different impact parameters, the different alarm information was given, increasing the protection and alerts function of the circuit.
Oil spills in the ocean are one of major environmental concerns, especially in the costal waters. Many satellite sensors, including optical sensors and microwave sensors, have been used to detect oil spills which often exhibit different feature in the satellite images compared with the surrounding waters. In this study, we used texture feature analysis to detect oil spill using MODIS and SAR images...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.