The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Almost every year, Indonesia suffers catastrophic forest fires that has an impact on the shrinking forest land in Indonesia. Hotspot is parameter that can be used as an indicator for forest fires. One of the data mining techniques that can be used to process hotspot data is clustering. Clustering technique is used to obtain interesting patterns so that analysis on the occurrence of hotspots can be...
To access sensitive information, some recent advanced attacks have been successful in exploiting implicit flows in a program in which sensitive data affects the control path and in turn affects other data. To track the sensitive data through implicit flows, several software and hardware based approaches have been proposed, but they suffer from the non-negligible performance overhead. In this paper,...
Recent advances in Neural Networks (NN) are enabling more and more innovative applications. As an energy-efficient hardware solution, machine learning accelerators for CNNs or traditional ANNs are also gaining popularity in the area of embedded vision, robotics and cyberphysics. However, the design parameters of NN models vary significantly from application to application. Hence, it's hard to provide...
For a small gas turbine engine test cell newly developed and built at the University of Defence in Brno a system for automated measurement and engine test control was designed. The system is based on National Instruments Compact RIO hardware and LabVIEW software and is implementing supervisory control and data acquisition (SCADA) architecture. This paper describes the requirements that drove the decision...
This paper presents an approach for securing software application chains in cloud environments. We use the concept of workflow management systems to explain the model. Our prototype is based on the Kepler scientific workflow system enhanced with security analytics package.
Network Function Virtualization (NFV) allows creating specialized network appliances out of general-purpose computing equipment (servers, storage, and switches). In this paper we present a PCIe DMA engine that allows boosting the performance of virtual network appliances by using FPGA accelerators. Two key technologies are demonstrated, SR-IOV and PCI Passthrough. Using these two technologies, a single...
Network Function Virtualization (NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtualized software instances. And, existing NFV infrastructure solutions are always architected on a general-purpose x86 server, which makes the performance of NFs limited by the hosted single...
This paper describes the co-simulation methodology adopted for hardware verification of a next generation network packet processing engine (Advanced I/O Processor or AIOP) utilizing virtual prototype models developed originally for software verification. Though co-simulation strategies are common in verification of stand-alone processors, they have seldom been used for mega-modules and SoC, which...
Aiming at the deficiency in the field of marine engineers training at present, an entire virtual training system for marine engineers has been designed and developed, which is composed of the full mission marine engine room simulator module and three-dimensional virtual marine engine room module, respectively aiming at cultivating the operating ability for marine engine room system and marine engine...
The sizes of databases are increasing every day. Hence, now days, accessing data in an acceptable time is one of the biggest challenges in centralized database. In centralized databases, the records can be categorized according to the access frequencies; least accessed records (cold data) and most accessed records (hot data). In a study it shows that more than 90% cases query are requested for hot...
Currently multiple Domain Specific Languages (DSLs) are used for model-driven software development, in some specific domains. Software development methods, such as agile development, are test-centered, and their application in model-based frameworks requires model support for test development. We introduce a specific language to define generic test models, which can be automatically transformed into...
The cooperative edition of (meta)models may be enacted by the exchange of change operation journals between the participants. But these are often composed of atomic operations (create, delete, set, …) that have no useful meaning for the users. Hence, detecting and recovering composite operations is a crucial step to help users understand the history of their (meta)models in terms of higher level operations...
In modern systems there is a desire to create Test Program Sets (TPSs) in multiple languages. However, most Automatic Test Equipment (ATE) is designed with only one test executive in mind and the exclusion of all others. This paper discusses a proven design to allow for Multiple Test Executives (MTE) on a single system. In addition, the test executives are divorced from the operator or maintainer...
Modern SoC designs incorporate several security policies to protect sensitive assets from unauthorized access. The policies affect multiple design blocks, and may involve subtle interactions between hardware, firmware, and software. This makes it difficult for SoC designers to implement these policies, and system validators to ensure adherence. Associated problems include complexity in upgrading these...
Any small defect is not permitted in the industry, so PLC real-time engine performance is very important for industry robot control system. Because these industrial characteristic, a new untested system can't be used in real field.
Objectives: Digitalization of maternal and post-natal care system (DigiMAPS) is a system consist of electronic medical record for mother and children health (KIA) also for tele-consultation facility called “Tele-Obgyn”. Our project focuses on the development of KIA Online and a cloud computing-based video conferencing as a basis of Tele-Obgyn platform. The web-based network allows online access not...
The use of Network Function Virtualization to run network services in software enables Software Defined Networks to create a largely software-based network. We envision a dynamic and flexible network that can support a smarter data plane than just simple switches that forward packets. This network architecture needs to support complex stateful routing of flows where processing by network functions...
In Multi-Agent Systems, first-class interaction protocols are the ones which implementations are decoupled from the agents. This paper introduces and establishes the contribution of RPI.Idiom which is a high-level language for specifying such protocols. RPI.Idiom interaction protocols satisfy several properties. They are role-based which means that they are abstract in regard of the agents. They can...
Malware can spread uncontrollably if left unchecked and can cause significant damage to the Advanced Metering Infrastructure (AMI) and ultimately to the underlying power grid. Application layer protocols used in the AMI are capable of carrying large payloads which could be potentially used to hide malware. Fortunately, application layer traffic in the AMI is not expected to contain executable content...
In this paper, the customized team matching system for revitalizing the athletics in public is proposed in smart device environment. The proposed system, CTMS, Customized Team Matching System, collects profiles of community sports teams, analyzes those profiles, and recommends customized sport team. The proposed system is expected to design new service model which will improve revitalization of community...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.