The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing and cloud storage systems are being used more and more in a variety of domains, from everyday user applications like healthcare monitoring systems and intelligent buildings to military devices. The deployment of these frameworks also enables modern control and automation paradigms found in cyber-physical systems and Industry 4.0. Driven by exponential decreases in computing and storage...
The intensive research for developing smart environments is based on building energy management systems. There exist demonstrated results that indicate a significant correlation between measured occupancy status and environmental conditions. In this context, the occupancy behaviour plays a key role to illustrate the consequent energy impact in energy savings HVAC control strategies, security, energy...
The dense instrumentation of future smart buildings enables the implementation of advanced control techniques which are aimed at the dual objectives of energy efficiency/cost savings and occupant comfort. One of the essential functions and prerequisite consists of robust dynamic occupancy detection and prediction which allows improved estimation of active thermal zones and internal loads, as compared...
There are already plenty of Internet of Things (IoT) architectures and systems available worldwide and this creates challenges for software development and systems entities that use these platforms. Global visibility and interoperability through the exposure of these platforms via the web can be achieved through a new paradigm to support an open framework for Web of Things (WoT), which is analogous...
Today, the cyber-space landscape is filled with vulnerabilities and malicious users that exploit them. Adding to this the technological context, with data flooding from all directions, it is evident that maintaining a good level of security for our systems has become a challenge. The high-dimensional datasets generated by all these diverse technologies needs to be processed efficiently. Inside the...
Networked embedded systems have been increasingly deployed in key application areas such as healthcare, home automation, industrial machines, large scale military and environmental monitoring. This has enabled the cyber-physical systems paradigm through wireless sensor networks (WSN) which collect, store, process and transmit information about a focused physical process or system to evolve. One of...
As new security intrusions arise so does the demand for viable intrusion detection systems These solutions must deal with huge data volumes, high speed network traffics and countervail new and various types of security threats. In this paper we combine existing technologies to construct an Anomaly based Intrusion Detection System. Our approach improves the Support Vector Machine classifier by exploiting...
The Internet of Things (IoT) refers to the set of devices and systems that interconnect real world sensors and actuators to the Internet. This includes many different systems, including smart objects, smart monitoring devices, home automation systems, smartphones (which are increasingly being used to measure the world around them) and many more. This paper presents the concept, architecture, building...
This work is a aggregated perspective of previous papers studying advanced control strategy applicable in intermittently heated buildings. This strategy mainly aims to optimize the energy efficiency of heating systems taking into consideration the minimization of the needful time and the computational resources necessary to this process. Model Predictive Control is the control strategy used in this...
Nowadays, we witness a tremendous increase in systems that sense various facets of humans and their surrounding environments. In particular, the detection of human emotions can lead to emotionally-aware applications that use this information to help improving people's daily lives and offering new business opportunities. We address the issue of maintaining privacy for this type of applications. In...
This paper presents an optimal strategy for thermal control of a real building. The control algorithm uses a strategy based on model predictive control MPC (Model Predictive Control). In this control strategy, in order to improve system performance regarding the comfort and the energy consumption, weather forecast and occupancy of the building program are taken into consideration. To achieve optimal...
The large number and various technological solutions adopted by many enterprises, overwhelms security systems, which must acquire informations from all these diverse sources and interpret them. Furthermore, the proliferation of more complex cyber threats imposes a difficult task for information security assurance. Therefore, it is clear that new solutions are required. In this paper we propose a wrapper...
When there is the desire to achieve optimal temperature control for a building or its energetic performance description, one of the steps that should be followed is to identify experimentally the dynamic model for heat transfer in that building. In these models there are used heat equations in time domain, but as these systems have multiple inputs and outputs, these equations can be represented in...
The increasing interest in the development of open-source, IPv6 platforms for Wireless Sensor Networks (WSN) and the Internet of Things (IoT), offers a significant potential ubiquitous monitoring and control. The usage of IPv6 in WSNs enables the integration of sensing applications with the Internet. For relevant goals, we consider security should properly be addressed as an integral part of high-level...
In the current social, technological and economic context, customers make their decisions based mostly on the opinion of other consumers. On the other side, companies need quick feedback from their customers in order to adapt to their needs in real time. The effective connection between these two aspects relies on opinion mining tools, which automatically process consumers' reviews and opinions about...
Information Security Assurance implies ensuring the integrity, confidentiality and availability of critical assets for an organization. The large amount of events to monitor in a fluid system in terms of topology and variety of new hardware or software, overwhelms monitoring controls. Furthermore, the multi-facets of cyber threats today makes it difficult even for security experts to handle and keep...
The continuous proliferation of more complex and various security threats leads to the conclusion that new solutions are required. Intrusion Detection Systems can be a pertinent solution because they can deal with the large data volumes of logs gathered from the multitude of systems and can even identify new types of attacks if based on anomaly detection. In this paper we propose an IDS model which...
The multitude of hardware and software applications generate a lot of data and burden security solutions that must acquire informations from all these heterogenous systems. Adding the current dynamic and complex cyber threats in this context, make it clear that new security solutions are needed. In this paper we propose a wrapper feature selection approach that combines two machine learning algorithms...
Intrusion Detection Systems(IDS) have become an essential part of every security framework. These systems rely on monitoring and detection of intrusions, thus composing an additional line of defense. Several paradigms have been applied for implementing IDS. In this paper we propose a NIDS model based on Information Gain for feature selection and Support Vector Machines(SVM) for the detection component...
Wireless Sensor Networks (WSN) offer a significant potential for ubiquitous monitoring and control in future internet-connected pervasive systems architectures. This can be achieved through seamless integration along existing networking devices and systems, while taking account the data-driven nature and security constraints imposed upon such low power, efficient embedded networked platforms. We argue...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.