The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The implementation of devices or sensors developed over open source electronic platforms is a very important key of the projects aiming for promoting concepts such as Internet of things and Smart Cities. Due to the heterogeneity of these projects and especially the lack of a standard to regulate the communication process between the sensors and the application server, taking into account that many...
Virtual Desktop Infrastructure (VDI) is a new generation of cloud service in which users operating systems execute in a cloud data center. Users can access their desktops and applications by using thin client devices. This thin client is consisting of only a screen attached with low power CPU. This new paradigm of delivering remote desktop provides benefits in terms of flexibility, cost reduction,...
Today, an ever-increasing number of devices has networking capability. The main implication of this fact is that such devices are often left fully powered yet idle just to maintain their network presence, hence leading to large energy waste. This ultimately results in higher electricity cost for consumers. This paper tackles an effective mechanism to reduce energy waste of consumer electronics, by...
The electrical engineering approach to cache coherence is defined not only by the study of IPv7, but also by the natural need for A search 12. In fact, few cyberneticists would disagree with the valuation of write-back caches. Grafter, our new algorithm for cacheable configurations, is the solution to all of these problems.
Telemetry is an important function of the Internet of Things as it is being developed and deployed today. Of particular interest within this area are energy monitoring services. In this paper we describe Watts App, a social telemetry gathering and comparison platform, which was built as a demonstrator that integrates technologies from embedded systems to mobile applications. We used the SNMP protocol...
The Internet of Things (IOT), the idea of getting real-world objects connected with each other, will change the ways we organize, obtain and consume information radically. Through sensor networks, agriculture can be connected to the IOT, which allows us to create connections among agronomists, farmers and crops regardless of their geographical differences. With the help of the connections, the agronomists...
Nowadays, organizations discover that it is essential to protect their valuable information and internal resources from unauthorized access like deploying firewall. Firewall could prevent unauthorized access, but it cannot monitor network attacks. Another network security tool such as intrusion detection system is necessary to perform network activities monitoring. With the recent trend of high-speed...
IPv6 over Low-power Personal Area Networks (6LoWPANs) enables IPv6 support for wireless sensor networks (WSNs), making them connectable through the Internet. However, new gateway devices are needed in order to make end-to-end connectivity between sensor nodes and Internet devices possible. In this paper, a ready-to-use WSN gateway is constructed to connect WSNs and IPv6 hosts, allowing interaction...
Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats...
Applying WSN (wireless sensor networks) technology to the fire safety can actualize wireless requirement, network, and intelligent fire monitoring. A wireless fire detection system based on WSN was described in the thesis, which can acquire data of temperature and smoke concentration. Fire detection nodes using SOC CC2430 as the control unit to realize the communication between nodes, the software...
Aiming at monitoring information of HCHO, CH4, LPG and other toxic and harmful gas concentrations in the chemical production plant, the monitoring system designed a ZigBee wireless sensor network composed of CC2430, MC114 and MS1100 gas sensor, which built a safe, low power consumption, flexible detection system of toxic and harmful gas concentrations. As the system data transmission with the mode...
Run time reconfigurable hardware combines some of the flexibility of software with the high performance of hardware. Hybrid computing systems that use reconfigurable hardware can save much energy compared to traditional high performance server systems and also have a long life expectancy due to its adaptability and the use of self-repairing techniques. So far reconfigurable hardware has mainly been...
Three requirements for leased-line service in a packet-transport system are determined such as service availability of 99.999%, bandwidth guarantee of 100%, and latency of 10 ms via 20 nodes. To meet these requirements, network architecture is proposed which includes the separation of control function and data-transmission function and shaping per flow at the entrance of a network. Nodes and gateways...
Advances in portable devices and location-aware applications have necessitated the research in sophisticated yet small-footprint hardware and software in embedded systems, while the proliferation of the Web and distributed database systems has led to new data mining applications. We are investigating the utilization of reconfigurable hardware, due to its flexibility and performance, for data mining...
Sensor nodes in ubiquitous sensor network (USN) environments are composed of many sensors and hardware components for various purposes and applications, such as service in the industrial field, the public administration sector, and in life services. A middleware is required for wireless sensors to treat a huge amount of information from sensor nodes. However, the use of a middleware and specialized...
Community networks intrinsically rely on being able to deploy large scale projects with an explicit focus on cost effectiveness. As such, they often leverage not only open-source software, but also some proprietary solutions which, although closed source, may not command a licence fee. This paper briefly discusses an undergraduate project addressing a hardware solution integrating several open-source...
Today the construction of wireless sensing systems requires the use of rather high-priced pieces of hardware and the assembly of these hardware parts (wireless transmission core, sensor module, gateway device), as well as the implementation of the according software (sensor mote software, gateway software, end user software). This makes overall development and the thereby resulting product costly...
More and more devices become network enabled and are integrated within one large, distributed system. The service-oriented paradigm is the main concept to implement this approach and to cope with the heterogeneity of the underlying network. However, resource constraints imposed by the underlying hardware, such as 8-bit micro controllers, require efficient protocols and often prohibit the use of technologies...
Ensuring that IP Security (IPSec) gateway meets its performance expectations is one of the most important objectives that IPSec gateway development team must face with. Only suitable validation approach may prove that IPSec gateway throughput is correct, Security Associationspsila adding/removing time is acceptable, IPSec gateway is capable of processing huge number of flows and IPSec rekeying works...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.