The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Microservices have become a popular pattern for deploying scale-out application logic and are used at companies like Netflix, IBM, and Google. An advantage of using microservices is their loose coupling, which leads to agile and rapid evolution, and continuous re-deployment. However, developers are tasked with managing this evolution and largely do so manually by continuously collecting and evaluating...
The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses...
Close monitoring ICU patients is a necessity for health care providers. Prediction of mortality of ICU patients based on the monitored data is an active research area. If the probability of survival (or death) of a patient could be predicted early enough, proper and timely attention could be given to the patient, saving the patients life. Most of the existing work in this regard try to predict mortality...
Although it is possible to design and manufacture MPSoCs with hundreds of processors, there is still a gap in the ability to debug hardware, software, and applications for such chips. Current state-of-the-art works related to MPSoC debugging suffer from poor integration, scalability in data storage, and simple graphical data representation. This work proposes a modular debugging framework to aid the...
An artificial Satellite's health and functioning in space is monitored by analysing the stream of Telemetry Data received at the Satellite Ground Control Centre. This data is received continually during the entire mission life of the Satellite. Hence a huge volume of Data is collected for any given satellite. Data Mining techniques are now regularly applied to analyse such large quantity of data for...
This paper introduces the reasons for big data analytics in distribution network studies and potential benefits it could give. Summary of the most common data mining methods used in power system studies is also given, followed by a comparative analysis. A use case is shown at the end in order to present some examples of extraction of useful information from raw data stored in a real distribution utility's...
The ability to express feelings and needs, to share ideas or to establish relations is fundamental in different stages of human life. During language acquisition, a child develops several intellectual, psychological and emotional skills that support many other brain functions. On those grounds, speech-language therapy is a fundamental process for those people who suffer from communication disorders...
Targeting human activities responsible for the energy consumption instead of focusing solely on single appliance feedback for achieving energy efficiency in residential homes would link human behaviors to the resulting energy consumption. To this end, learning when appliances are in an active or idle state and the related user activity is crucial. Until smart appliances become widespread and can communicate...
Workflow systems manage large-scale experiments and deliver a large volume of provenance data traces. The provenance repository of these systems contains information about the workflow execution, which allows for tracking and analyzing data transformations. However, provenance data may still be considered a black-box, when it comes to analyze the contents of resulting data files. Current solutions...
Preventing system failure in cloud has become more important as a result of the prevalence of cloud use for mission-critical applications. One of the major causes of system failure in clouds is misconfiguration, as shown in recent studies. Hence, it is essential first to detect misconfiguration before it causes outage or degradation of service. Although cloud provides us flexible and auto-configurable...
Staying informed about security vulnerabilities, work-arounds and the availability of patches regarding the components of a given system is crucial to ensure system security. Several channels can be used to the monitor the new vulnerabilities publications, but these channels are scattered. We propose in this paper a vulnerability monitoring system based on twitter analysis that aggregates and analyses...
In this paper, we present Real-Time Flash-Flood Monitoring, Alerting and Forecasting System using Data mining and wireless sensor Network. Our System not only Measures River Water level and Different weather conditions such as temperature, humidity and vibration through wireless sensor nodes but also we can forecast possibility of future disasters by using Data mining algorithm on our database.
Database audit logs contain the information about database operations which are helpful to verify accuracy, lawfulness and to report risks. In financial systems, the audit logs should be monitored on continuous basis in order to detect and take action against any reasonably abnormal behavior. Outlier detection is a very important concept in the data mining which is useful in data analysis. Nowadays,...
Synthetic Decision Support System is combined with online analytical processing, data mining, model libraries, databases and knowledge bases. It will become one of the key technologies of data management services of Internet of Things, and it will establish the foundation for the smart city. This paper researches on the sequential pattern mining for decision support, implements the Prefix Span algorithm,...
The key task of telecommunication systems in deep mining is to ensure safety and continuity of production. These systems, despite modern and innovative infrastructure monitoring solutions, are not free from drawbacks. The occurrence of false alarms of damage to infrastructure is the practical problem which causes many negative effects, such as increasing the cost of the current operation of the system,...
With the improved elasticity of the computing landscape, resources can be added or removed on demand. These new capabilities require a closer look at the link between business processes and IT infrastructure. Therefore, it seems prudent to focus on a conceptual blueprint that will encourage research in developing pragmatic offerings in monitoring, measuring, and analyzing this relationship with the...
Adverse drug events (ADEs) are common, costly and a public health issue. Today, their detection relies on medical chart review and spontaneous reports, but this is known to be rather ineffective. Along with the increasing availability of clinical patient data in electronic health records (EHRs), a computer-based ADE detection has a tremendous potential to contribute to patient safety. Current ADE...
Trace-oriented runtime monitoring is a very effective method to improve the reliability of distributed systems. However, for medium-scale distributed systems, existing traceoriented monitoring frameworks are either not powerful or efficient enough, or too complex and expensive to deploy and maintain. In this paper, we present MTracer, which is a lightweight trace-oriented monitoring system for mediumscale...
Innumerable terror and suspicious messages are sent through Instant Messengers (IM) and Social Networking Sites (SNS) which are untraced, leading to hindrance for network communications and cyber security. We propose a Framework that discover and predict such messages that are sent using IM or SNS like Facebook, Twitter, LinkedIn, and others. Further, these instant messages are put under surveillance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.