The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The design of new device for electromagnetic compatibility testing — environmental shielded TEM-chamber — is considered. Diagnostic algorithms and functional structure decomposition of the chamber are presented. Tasks for a monitoring service of the chamber are indicated. The possibility of the diagnostic service implementation within a real-time operating system is considered for the chamber status...
The management of network infrastructures has become increasingly complex over time, which is mainly attributed to the introduction of new functionality to support emerging services and applications. To address this important issue, research efforts in the last few years focused on developing software-defined networking solutions. While initial work proposed centralized architectures, their scalability...
This paper describes recent developments at JIVE and the European VLBI Network (EVN), aimed at fostering the seamless interaction of VLBI networks around the globe, and eventually the inclusion of the SKA and its precursors as VLBI elements.
Technical debt monitoring is one of the activities that have to be performed in technical debt management. To do that, there are different techniques that can be used to estimate technical debt and different tools that implement those different techniques. This paper presents TEDMA Tool, a tool for monitoring technical debt over the software evolution and that it is open to integrate third party tools...
The design of today's systems on chip (SoC's) raises difficult issues, in particular regarding verification. In their early design phases, hardware/software embedded systems are commonly described as ESL (Electronic System Level) models, such that their functional and transactional behavior can be analyzed by simulation. To enhance this validation process, we have previously developed a framework...
Existing attestation solutions based on Linux Integrity Measurement Architecture treat the network as an untrusted input. Thus, they often employ strict access control mechanisms with tunneling policies to prevent network flows from tainting the system. However, these different access control policies are challenging for administrators to model and verify for different Linux deployments, making them...
Significant recent research activities and initiatives by local governments to establish resilient smart city infrastructures signal that time is right for smart cities in the near future. For example, sensors deployed within a city could monitor traffic patterns, perform environmental measurements and determine optimum traffic routing, when deployed in areas that have a power infrastructure. In this...
Technical debt (TD) refers to likely long-term costs associated with software development shortcuts taken by programmers to achieve short-term business benefits. If a development team does not manage TD, it can cause significant long-term problems such as high maintenance costs. Management strategies monitor debt items and evaluate when and if they should be paid. In order to effectively support this...
A major challenge for the European electronic industry is to enhance productivity while reducing costs and ensuring quality in development, integration and maintenance. Model-Driven Engineering (MDE) principles and techniques have already shown promising capabilities but still need to scale to support real-world scenarios implied by the full deployment and use of complex electronic components and...
The impacts of cyber-fault resolution techniques on the dynamics of feedback control systems are explored, using simple case studies. Specifically, for a three-state DC motor model, simple control schemes implemented using embedded microcontrollers are modeled as being subject to freeze faults, which are resolved using watchdog-timer technologies. Simulations are undertaken to characterize the impacts...
Due to economies of scale and advancement in silicon technologies, powerful computing platforms are ushering a new era in computing and connectivity. These platforms are sometimes categorized under the umbrella of Internet of Things (IoT). In this paper, one such platform is used to design and build an Internet of Things solar tracker. The solar tracker predicts the sun position for maximum power...
Many games use dynamic difficulty adjustment (DDA) to promote the achievement of flow and consequent positive affective states. However, performance based DDA assume a specific ludic attitude: that of the hard-core gamer. An alternative approach is to apply affective computing techniques to monitor players adjust difficulty to achieve the desired affective state directly. Such an emotion-controlled...
With the rapid development of society and remarkable improvement of the power distribution automation of our country, users put forward higher requirements to power quality and reliability of power supply. According to the distribution network structure and operation mode, combining large-scale blackouts of Hangzhou distribution grid, this paper did a depth study on rapid restoration technology, under...
This paper presents ionospheric scintillation data recorded at SANAE in Antarctica during a moderate geomagnetic storm on 20–21 January 2016 which gives evidence of the advantages of the new generation of instrumentation for monitoring ionospheric scintillation. The data was collected as part of the DemoGRAPE project aimed at the demonstration of cutting edge technology for the empirical assessment...
The Public Street Lighting System is a street lighting system at night or when the environment is dark. Control and monitoring system is one of the critical sides in the implementation of Public Street Lighting as a whole. So far, the Public Street Lighting treatment system is done manually, that causes many problems to the whole system. These problems resulted in very high maintenance costs and usability...
Vacuum technology is a very widespread area. Nowadays, a broad variety of applications can be found to be using vacuum and vacuum related monitoring. Vacuum profile for different applications can be different, but whatever that may be, monitoring it is an essential part of any such application. Thus, this paper describes the development of one such vacuum profile monitoring system that can be re-purposed...
First of all, this paper briefly introduces the current management and use of telemetry data, remote control information, satellite test environment data, space environment data after orbit and so on, which most are produced by satellite test and on-orbit management. Then the software platform for application of the satellite data accessing and monitoring based on the distributed large data management...
Background: Mobile Personal Health Records (mPHRs) are mobile applications that allow organizing and saving the patients' health data in order to ease their management and access for both patients and doctors. Objective: This study aims to evaluate, based on ISO/IEC 25010 quality standard, the software quality of mPHRs for pregnancy monitoring. Method: An External quality evaluation was carried out...
Byzantine attacks are constant threats in many applications such as disaster management, and battlefield applications. In this paper, we introduce a monitoring scheme in the link state routing protocol to secure the packets' route against Byzantine attacks. The goal of our proposed scheme is to guarantee communication among connected benign nodes in the network. Specifically, each node monitors the...
The ever growing demands of software solutions have led to the development of Large-Scale Distributed Systems, which bring together a wide pool of services and resources. Their composition and deployment come in different solutions tailored to users' requests based on business models, functionality, quality of service and costs. Bridging different parts into one software solution is brittle due to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.