The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A standardized Communication / Information Protocol is necessary for implementing the 4 upper digitalization layers of Industrie 4.0-compliant solutions. OPC UA is one of the leading and preferred technology. Currently, there are many different OPC UA implementations available on the market. This paper gives an overview of existing solutions and shows the results of an initial benchmarking based on...
The Internet of Things means a connected world. When reaching the industrial level, the automation equipment present a large life cycle and the systems are many times conceived using proprietary protocols. Bringing interoperability to local automation is often a difficult task and changes in the functional structures, particularly in the case of critical infrastructures like the water industry, have...
Due to the high cost and high power consumption problem of the present smart home server, we designed and implemented a home server based on embedded system, mainly developed by ARM11 for a hardware platform, Linux system for operating system, SQLite database and BOA server for a software platform. The home server has successfully implemented the network communication, SQLite database peration and...
Particulate matter pollution becomes an increasingly important problem in developing countries and poses a hazard to human health especially in indoor environment. At the same time, modern buildings are equipped with advanced sensing and control technologies, offering control and optimization capabilities over a large range of parameters. This paper proposes an open platform of a WiFi-enabled indoor...
The advances in computational techniques both from a software and hardware viewpoint lead to the development of projects whose complexity could be quite challenging, e.g., biomedical simulations. In order to deal with the increased demand of computational power many collaborative approaches have been proposed in order apply proper partitioning strategy able to assign pieces of execution to a crowd...
Physical exercising has always had an important impact on humans' health. Lack of motivation is one of the major reasons that keeps a person from exercising. To overcome this problem, new solutions are needed to provide weight watchers and fitness seekers motivation to exercise indoors. This paper presents iGym, a low cost and flexible system that enhances humans' workout experience. This system lets...
Software applications contain valuable assets that, if compromised, can make the security of users at stake and cause huge monetary losses for software developers. Software protections are applied whenever assets' security is at risk as they delay successful attacks. Unfortunately, protections might have recognizable fingerprints that can expose the location of the assets, thus facilitating the attackers'...
Identifying fall risk can prevent injuries in the elderly as well as reduce the related financial burden. A balance assessment, Timed Up and Go (TUG), has been widely applied to estimate fall risk. However, the standardized TUG usually excludes complex factors (e.g. slopes and obstacles) falling short of representing challenges in environments that many older adults navigate. Having information on...
In this paper, based on the dimethyl ether plant process and production process control system, the optimal design of DME control system is studied and the simulation system are established. First of all, the production equipment is regarded as the research object, and through the device operation requirements and device characteristics of structural analysis, and combined with the DCS control system...
Providing the optimal configuration for a software router poses a lot of technical challenges that do not present in the dedicated hardware router. One of them is how to characterize performance varying due to different configurations on commodity hardware. This paper addresses the problem of configuring a software router that provides the minimum of average packet latency. Since changing all combinations...
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he...
To address increasing problems caused by cyber attacks, we leverage Software Defined networks and Network Function Virtualisation governed by a SARNET-agent to enable autonomous response and attack mitigation. A Secure Autonomous Response Network (SARNET) uses a control loop to constantly assess the security state of the network by means of observables. Using a prototype we introduce the metrics impact...
In the SDN/NFV ecosystem, network services are provided as single Virtual Network Functions (VNFs) or chains of them, each instantiated and executed on dedicated servers. So far, the chaining of those virtual functions, which is also known as the service chain composition problem, has been mostly performed by Telco Operators (TOs) for the great advantages they receive in terms of Capex and OpEX. However,...
This paper introduces a cost effective scheme for a Cloud Radio Access Network (C-RAN) based on virtualization, which is a technology used to reduce Power Consumption (PC) in the Base Band Unit (BBU pool). The BBU's function is proposed to be as a software application running in a servers, which is called the virtual BBU (vBBU). To asses the proposal scheme, a power model of the BBU pool is proposed...
In this paper, the design, construction, and testing of a fully-functional virtualised mobile core network is outlined. Lessons learned and recommendations for future improvements are provided. The presented work uses open-source software for virtual network function infrastructure control (OpenStack), network flow programming (OpenDaylight), and network orchestration (OpenBaton) to virtualise a commercial...
Traditionally, network core devices are simple and the complexity is in the end-hosts. With the rise of Software- Defined Networking, this changes and complex functions are moved into the network core. This paper presents Transparent Transmission Segmentation (TTS), which is able to improve performance by executing parts of network functions at the core. An implementation for segmenting TCP connections...
This paper presents the cloud infrastructure of the AEGLE project, that targets to integrate cloud technologies together with heterogeneous reconfigurable computing in large scale healthcare systems for Big Bio-Data analytics. AEGLEs engineering concept brings together the hot big-data engines with emerging acceleration technologies, putting the basis for personalized and integrated health-care services,...
System landscapes within logistical scenarios is highly heterogenic. Adding specific mechanisms, e.g. to support planing, monitoring and analyses for fully electrical powered vehicles, could become a mess or at least a challenge. While our project Smart City Logistic (SCL) is trying to manage this extension for multiple logistic scenarios, other projects want to do comparable system extensions as...
The challenges posed by the Internet of Things (IoT) render existing security measures ineffective against emerging networks and devices. These challenges include heterogeneity, operation in open environments, and scalability. In this paper, we propose SST (Secure Swarm Toolkit), an open-source toolkit for construction and deployment of an authorization service infrastructure for the IoT. The infrastructure...
Programmable Logic Controllers (PLCs) are specialized computing systems for the control and monitoring of distributed industrial devices. Aiming for a highly connected industrial Internet-of-Things (IoT) ecosystem, PLCopen OPC Unified Architecture (UA) specification has been released. This paper presents the implementation and evaluation of a PLCopen OPC-UA software component for industrial control...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.