The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trends in industrial automation systems are placing more importance on using streams of digitized data to perform various automation functions in real-time, e.g., power, process, and factory automation. To ensure high reliability and availability, individual devices or (sub-)systems thereof need to be tested with respect to their expected real-time behavior in the system context at various stages...
The Classroom Attentiveness Classification Tool (ClassACT) is a system designed to monitor student attentiveness in a variety of instructional phases within the learning environment: lectures, group work, assessments, etc. By collecting information about the user, the user's environment, and the device itself via the various sensors built in to the tablet, processing the data, and then passing it...
This paper describes the proposed system, which is able to control, monitor and record the usage of home electrical devices. The system is designed to overcome the high cost and inflexible of electrical device's installation due to rearrange rooms, and the demand of user to be able to monitor the electrical usage. Here, the system was developed using micro-controllers equipped with WiFi modules, which...
HALT, Highly Accelerated Life Test, is a process used to discover product weakness and design margins. Used on printed circuit board assemblies (PCBAs) or product modules, it consists of a series of environmental stresses applied to the product in increasing levels of stress, until the product malfunctions or fails. HALT typically utilizes stresses well beyond the product specifications in order to...
Silicon photo-multipliers (SiPMs) are currently progressively replacing photo-multipliers tubes (PMTs) in most applications due to their technical advantages, specially in high energy physics experiments. This work describes a system to test photo-detectors in order to calibrate and characterize the parameters generally defined by scientific projects requirements. The system controls and monitors...
Power grid is a critical infrastructure of the modem society, however it is vulnerable to numerous types of disturbances. With the growth of the load and the high penetration of the renewable energy sources the grid turned out to be more susceptible to power failures, that exposes the environment and public safety to risk. Since synchrophasor technology was introduced, developed, and partly integrated...
Performance regressions, such as a higher CPU utilization than in the previous version of an application, are caused by software application updates that negatively affect the performance of an application.Although a plethora of mining software repository research has been done to detect such regressions, research tools are generally not readily available to practitioners. Application Performance...
This paper deals with measurements and statistical processing of the acceleration data measured in the area of the human head. Kinetic energy harvesters require such levels of acceleration for their excitation that could possibly be obtained from human movements. 30 different people with different characteristics were thus measured during walking at controlled speeds in order to find the common frequencies...
Hardware Trojans are a major concern due to the damage caused by their stealth. One popular utilization of Multiprocessor System on Chips (MPSoCs) is the Pipelined MPSoC (PMPSoC) architectures. They are used in applications from video surveillance to consumer electronics. We present a method that detects the presence of Trojans in third party IP cores of PMPSoCs, by continuous monitoring and testing,...
The paper reports a novel low-cost batch fabrication technique for monolithically integrated pressure plus two-axis (X/Z) acceleration composite sensors for upgraded production of automobile TPMS (tire-pressure monitoring systems). The newly added X-axis accelerometer is used for automatically identifying and positioning each of the four wheels. Benefited from the single-wafer front-side fabrication...
This demo presents an approach to networked educational virtual reality for virtual field trips and guided exploration. It shows an asymmetric collaborative interface in which a remote teacher stands in front of a large display and depth camera (Kinect) while students are immersed with HMDs. The teacher's front-facing mesh is streamed into the environment to assist students and deliver instruction...
In this paper, we present a real-time drone detection and monitoring system, that users can easily utilize in daily life to detect drones using sound data. This system performs FFT on the sampled real-time data and performs drone detection using the transformed data through two different methods, Plotted Image Machine Learning (PIL) and K Nearest Neighbors (KNN). The PIL uses image data from the visualized...
We propose a preferential theme matrix for selecting a problem in carrying out the minor project for 6th semester Computer Science and Engineering (CSE) students. The matrix comprises of emerging technologies, research areas and the application domains as the parameters. It included Internet of Things, Cloud Computing, Mobility and Web Technology as emerging technologies. The focused research areas...
Traditional symbolic execution for testing software focuses on exploring the paths of the program. However, for stateful network protocol, this method is hard to explore all the protocol states. This paper proposes a novel method based on model-guided symbolic execution, which can associate the program paths with the protocol states and utilize the protocol model to guide the test to explore interesting...
Verification acts as a major milestone in any semiconductorindustry. With the huge investment and time-to-marketpressure, the verification process must be expeditious and decisive. Since the introduction of the Universal Verification Environment(UVM) by Accellera in 2011, new techniques and packages aredeliberately added to facilitate the process of verification andgeneralize it as the UVM originally...
Prospective memory can maintain our ability to living independently, which is important for our daily lives. Evaluation of prospective memory can be reflecting the severity of cognitive ability regression. Previous studies developed slide-based task and living-based task to evaluate prospective memory performance in different conditions. However, as a new technology that can provide a more realistic...
In recent years, web services have become an indispensable part of our life. By use of personal computers, smart phones and wearable smart devices, people can enjoy the convenience brought by these web services and use them to not only enrich our daily life but also solve life issues. Thus, to more appropriately realize the performance of a web service, it is necessary to perform an overall and credible...
Vulnerability assessment is the practice of testing a computer system, network or application to identify, measure and rank vulnerabilities within the system. This project's goal is to create a distributed vulnerability assessment architecture utilizing multiple miniaturized computers such as Raspberry Pi 2 Model B. The scheme delegates scanning tasks to low-cost and self-contained miniaturized devices...
Human age estimation is an important research topic and can find its applications in such as commodity recommendation and security monitoring. The establishment of existing estimators basically follows a same pipeline, i.e., an estimator is built from a given training dataset like FG-NET and then evaluated on a holdout testing set to determine its effectiveness. In doing so, a usually-followed assumption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.