The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The advent of the Internet of Things (IoT) has given the opportunity for the optimization and realization of different applications in various areas. The implementation of the Internet of Nano-Things (IoNT) will revolutionize healthcare systems. It will streamline the diagnostic and prognostic processes and aid in the treatment of patients through accurate and localized drug delivery and tumor and...
This paper investigates the online monitoring of electrical machine winding insulation systems based on the parametric modeling and identification. The proposed method consists in monitoring the drift of diagnostic indicators built from in-situ estimation of high-frequency electrical model parameters. The involved model structures are derived from the RLC network modeling of the winding insulation...
This paper describes a prototype model for cardiovascular activity and fitness monitoring system based on IEEE 11073 family of standard for medical device communication. It identifies basic requirements for developing a biomedical sensor network having resource limited sensor nodes to acquire, retrieve and communicate various physiological parameters while using short range wireless technologies....
To promote the information technology development of the enterprise, achieve information integration and data share between different fieldbuses, by means of analyzing communication bus of industrial control system, the principle of the fieldbus protocol conversion is discussed. According to the basic construction of network, a scheme of fieldbus conversion is designed to accomplish the communication...
The requirements of transforming the centralized and one-way flow of control and information by energy service providers to the decentralized and two-way flow structure enabling plug-and-play are rapidly increasing. The importance of reliable, high-quality electrical power continues to grow as society enters into a new era of economics driven by digitally-based technologies. Enabling the digital economy...
Researches in network traffic analysis embrace a large diversity of goals and are based on a variety of methodologies and tools. To have a better insight on the real nature and on the evolution of network traffic we argue that fine-grain analysis of real traffic traces have to complement simulations studies as well as coarse grain measurement performed by classical flow measurement systems. In particular,...
The wireless mesh networks (WMNs) are statically deployed on heterogeneous areas and are operating in open wireless media, and thus it coexists with other networks operating on the same frequency with the same or different radio access technology (RAT). The WMNs experience two types of interferences according to the source of interference. Coexisted networks with WMN induce the interference called...
The paper addresses the problem of creating a comprehensive fault injection environment, which integrates and improves various simulation and supplementary functions. This is illustrated with experimental results.
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encryption. But all of them only address part of the problem of security in wireless sensor networks. Recently, the use of reputation and trust systems has become an important secure mechanism in wireless sensor networks. In this...
As a macro complex systematic engineering, the Digital Ocean project is an ongoing task in china. The mission of the Digital Ocean is to build an interactive network information system based on a three-dimensional globe. The Digital Ocean can help provide integrated information on historical, current and future states of ocean and coastal zone. This paper addresses the architecture of Digital Ocean,...
Traditional networks are built on the assumption that network entities cooperate based on a mandatory network communication semantic to achieve desirable qualities such as efficiency and scalability. Over the years, this assumption has been eroded by the emergence of users that alter network behavior in a way to benefit themselves at the expense of others. At one extreme, a malicious user/node may...
Successful uptake of digital ecosystems requires trust in the underlying platform and in the users of that platform. Accountability mechanisms provide a basis for creating, monitoring and evolving trust. This work analyses the requirements for accountability in digital ecosystems and proposes an accountability model for deployment of digital ecosystems in peer-to-peer networks.
The increasing ubiquity of mobile embedded systems has been matched by the evolution of a variety of wireless network standards and technologies. The major constraints of wireless embedded systems are limitations of communication bandwidth, processing capabilities, and battery power. Remote wireless embedded systems often act as sensors, which provide data to a certain community. The exchange of data...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.