The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fraud prevention in the banking sphere is a very important type of activity which can cover a whole range of fraud schemes — both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of the system of monitoring and analysis of threats...
Network function virtualization (NFV) is one of the promising technologies for the next-generation network. In the NFV environment, reliability and availability should be guaranteed at different levels through the use of monitoring frameworks; however, the current monitoring frameworks only focus on NFV infrastructure (NFVI)-related faults and not VM-related faults. In this paper, the current NFV...
All vehicles produced today must be fitted with an On-Board Diagnostic (OBD) interface. With the help of the OBD a data connection through the Controller Area Network (CAN) is realized with the Engine Control Unit (ECU). This control unit is instrumental in optimizing the engine performance. There are many OBD adapters on the market today, ranging from the cheap Do-It-Yourself kind to expensive, professional...
Household energy consumption is largely inefficient. In recent years, development in residential energy-use optimisation has attracted a great deal of attention. Given that consumers comprise a significant part of total demand, there is an incentive to assist users to manage household demand. This paper provides an introduction to Home Energy Management (HEM). An overview of available Home Energy...
For runtime verification techniques, the most important part that limits its usage is how to reduce the influence of monitors. An important indicator is the amount of software codes after monitor instrumentation. The application of RV is hindered from the size-explosion problem of monitor construction. Namely, the state number of the monitor obtained is doubly exponential in the size of the input...
Service Function Chaining (SFC) serves the traffic of a specific service along an ordered set of Service Functions (SFs). SFC uses Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies to reach the deployment and removal of SFC in an appropriate time with minimal costs. However, during the life time of deployed SFCs, the SFs are exposed to the risk of overloading,...
Programmable Logic Controllers (PLCs) are specialized computing systems for the control and monitoring of distributed industrial devices. Aiming for a highly connected industrial Internet-of-Things (IoT) ecosystem, PLCopen OPC Unified Architecture (UA) specification has been released. This paper presents the implementation and evaluation of a PLCopen OPC-UA software component for industrial control...
The information system audit developed in a data center it was based on the study of the domains of COBIT; for this reason the survey for each component it was developed with the goal of obtain the necessary information for audit. The analysis of this information, permited to establish the degree of compliance with international standards, and determine the maturity, risk levels of each of the components...
E-learning System has become a common constituent unit of web page of any higher education institution. At the Polytechnic Nikola Tesla in Gospic Loomen is established since 2010, a system that is designed in a role of teaching repository for students and for preparation of e-courses for the teachers and students. The aim of this paper is by using descriptive and inferential statistics, and based...
The Internet of Things (IoT) is being applied in a wide variety of applications, which demand a range of networking support. This includes wide area communication networks. Novel long range network technologies such as LoRa and Sigfox are emerging, but they remain difficult to deploy and configure for end-users who are not specialists in embedded systems. This paper addresses this problem by introducing...
ASML began collecting data off tools in fabs from ca 1986 for the purpose of diagnostics and troubleshooting. This continued on a manual basis through the 1980's and into the early 1990's when tools began to be connected to the fab network and to the internet. Following manual collection, networked data collection began to take shape and then remote collection began ca 1996. It was from then for the...
Saudi Aramco electrical control and monitoring system evolved to Power Systems Automation (PSA). The first implementation of PSA was in 2009 following Saudi Aramco Internal Standard 126 imbued with IEC-61850 standard. Since then, search for new automation solution did not stop and the Company's cyber security level of maturity has increased, questing for improved cyber security measures. This document...
Emission control and regulations have become very critical part in today's automobiles. With introduction of strict emission norms, the use of electronics in automobiles is increasing extensively. Which in turn is adding complications at manufacturer, OEs (Original Equipment Manufacturers) and at the service front. OBD (On Board Diagnostics) is one of critical tool used for the emission control in...
This paper shows how the McCabe cyclomatic complexity measure can be applied to enterprise architectures using standard enterprise architecture framework tools.
This work discusses the feasibility of monitoring ground stability and motion across the entire British landmass using satellite InSAR techniques. ERS-1/2 and ENVISAT archive data availability, topographic visibility and land cover constraints for multi-temporal InSAR techniques to succeed across Britain are analysed. Data volumes, hardware and software requirements for the generation of a nationwide...
We proposed a new webcam-based air-dose rate monitoring system, in which multiple webcams are driven remotely by a single PC. A CMOS image sensor in a webcam can detect not only visible light but also ionizing radiation. Covering the lens with light shield, we can observe radiation events. Gamma-ray event rates are well used for conventional measurements of air-dose rates. The event rates in units...
The range of the frequency to be measured by a measurement device depends on the purpose of performing the measurement. The frequency measurement device is built specifically according to its range while the price of the device is proportional to its functions. In this paper, a low frequency measurement device to monitor grid frequency is designed using Arduino technology. All aspects of the design...
Plant operation can be supported by continuous on-line monitoring of equipment states, enabling users to move towards predictive maintenance and to postpone inspection outages, reducing downtime and cost. On-line process monitoring and operator advisory systems support early detection of causes for sub-optimal plant operation and thus help to reduce fuel cost. Remote access to plant data makes it...
In this paper we describe nibble.io, an offline information kiosk that has been designed for deployment within the rural communities of developing countries. We show how a pervasive technology such as sound can be used as a method of interaction between low-end feature phones and information kiosks built using standard PC monitors. By connecting an embedded computer to a monitor we show how we are...
In this paper we present an analysis of xAPI from the self-regulated learning needs point of view, focusing on how we can record all the actions derived from the implementation of self-regulated learning strategies. There are several questions unanswered: Which information could generate each strategy? How do we record this information using xAPI? Is the vocabulary and statements of xAPI appropriate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.