The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a bio-impedance analysis (BIA) based wrist-worn heartbeat monitoring system is proposed. The system is able to estimate heart rate from a subject's wrist with only four electrodes. The design is achieved with a standard BIA device and off-the-shelf components for signal conditioning. The measured heartbeat-related impedance signal is compared with a reference heart rate signal obtained...
A model for monitoring the wind turbine gearbox based on Supervisory Control and Data Acquisition (SCADA) data is developed. A deep neural network (DNN) is trained with the data of normal gearboxes to predict its performance. The developed DNN model is next tested with data of the normal and abnormal gearboxes. The abnormal behavior of the gearbox can be detected by the statistical process control...
Historic buildings are in need of careful protection because they are the symbols of regional culture and artistry. On the other hand, utilization of underground space is a trend in modern urban development, which sometimes brings challenge to the protection of historic buildings. In this paper, the need for building translocation is presented, and a case study is made on the protection of a historic...
Sensitive information leaking of network servers attacked by malwares or hackers is a serious security risk of Internet. The paper presents a dynamic taint tracking based method to automatically detect sensitive data leaking. The method automatically tags sensitive data as taint data and monitors the propagation of taint data in memory. If the sensitive data is sent by sockets or written into files,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.