The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data and models show that Alaska waters are highly vulnerable to low saturation states of aragonite, an indicator of increasing ocean acidification conditions for this high-latitude region. With Alaskans heavily reliant on the ocean for their lives and livelihoods, both direct and indirect effects of ocean acidification (OA) could have serious implications on the species being harvested and the food...
Online data provide a way to monitor how users behave in social systems like social networks and online games, and understand which features turn an ordinary individual into a successful one. Here, we propose to study individual performance and success in Multiplayer Online Battle Arena (MOBA) games. Our purpose is to identify those behaviors and playing styles that are characteristic of players with...
This demo showcases some of the capabilities foreseen for the security infrastructure designed by the H2020 SHIELD project. SHIELD exploits NFV for adaptive monitoring of an IT infrastructure and for feeding the data to an analytics engine to detect attacks in real time. An intelligent reaction system is then activated to reconfigure the SDN/NFV infrastructure so that the attacks are thwarted. The...
Flexibility and extendibility of Software Defined Networks allows development of diverse network management and flow monitoring techniques. Yet, there are inherent tradeoffs between the quality of flow monitoring and the required network resources. In particular, collecting flow statistics, at the level of specific source-destination addresses (and, moreover, specific protocols and ports), requires...
In order to achieve the goal of the efficient and more productive education for university students, this study has presumed as the first step toward the goal that the maintenance of students' health consciousness to a certain level is a bottom line. Since wristband-type wearable devices, one of IoT (Internet of Things) devices are getting popular on campus, this study has implemented a monitoring...
Circuit level energy metering is becoming increasingly important in energy savings and demand response applications. While smart meters efficiently monitor the residential energy consumption and make it available to the users, they fail to provide circuit level power consumption. In this study, an array of Giant Magneto Resistive (GMR) sensors are deployed on circuit breakers as stick-on sensors to...
Benchmarking and profiling virtual network functions (VNFs) generates input knowledge for resource management decisions taken by management and orchestration systems. Such VNFs are usually not executed in isolation but are often deployed as part of a service function chain (SFC) that connects single functions into complex structures. To manage such chains, isolated performance profiles of single functions...
With the evolution towards the Fifth Generation of Mobile Communications (5G), Software-based Networks are paving the way to a radical transformation of Network Operators infrastructures. Novel technologies like Network Function Virtualisation (NFV) and Software Defined Network (SDN) are enabling new way of managing on-demand network resources. Focusing on the Mobile Core Network architecture, Service...
Software-defined networking (SDN) addresses pressing networking problems such as network virtualization and data center complexity. By separating the control plane from the data plane, SDN introduces a new abstraction layer. This new abstraction layer is typically implemented by means of a so-called SDN controller. SDN applications can interact with the controller to ensure network functionality....
In the context of the Open Network Automation Platform (ONAP), we develop in this paper a resource allocation strategy for deploying Virtualized Network Functions (VNFs) on distributed data centers. For this purpose, we rely on a three-level data center hierarchy exploiting co-location facilities available within Main and Core Central Offices. We precisely propose an active VNFs' placement strategy,...
Cheetah flows, which are high-rate flows, can cause increased packet delays and losses in other flows. Leveraging the flexibility offered by the NFV paradigm, our proposed Cheetah Flow Identification Network Function (CFINF) uses a novel method in which a new measure, short-duration flight rate, which is the rate of a flight of packets received over a fixed (short) time interval, is computed and compared...
Ongoing evolutions in the Network Function Virtualization (NFV) area show that software will play an increasingly important role within the telecommunication industry. It enables telco providers to faster introduce telecom services, combined with new possibilities to optimize and fine-tune operational performance. New virtualization and softwarization methods support fine-grained scaling of resources...
As cloud computing becomes popular, Platform as a Service (PaaS) plays an important role in a modern cloud system. The orchestration and efficiency attract more attention and demand a more intelligent solution. In this paper, we present Next Generation PaaS (NG-PaaS) which provides resource management, application management and performance monitoring. The NG-PaaS is built on docker to enable fine-grained...
Telehealth relies on the ability of Information and Communication Technology (ICT) to maximize the quality of care provided remotely. Remote Patient Monitoring (RPM) is a key part within telehealth that enables patient to use devices to measure vital signs and sends it to a healthcare professional. Patients usually have multiple devices to measure vital signs. Those devices might be manufactured by...
Some sleep disorders, such as sleep apnea, restless legs syndromes (RLS), and periodic limb movement disorder (PLMD), require a full-night sleep monitoring for diagnosis. Conventional sleep monitoring devices are disturbing and inconvenient for daily scene applications. In this poster paper, we propose a sleep monitoring system by embedding RFID tags into bed cloth and realize two main functions:...
Attack graphs constitute a powerful security tool aimed at modelling the many ways in which an attacker may compromise different assets in a network. Despite their usefulness in several security-related activities (e.g. hardening, monitoring, forensics), the complexity of these graphs can massively grow as the network becomes denser and larger, thus defying their practical usability. In this presentation,...
The health degree of large distributed information system reflected from the business perspective is the core index to measure the stability of information system. It has significant meaning for the fault diagnosis of any information system. To solve the above problems, a knowledge representation method based on weighted fault diagnosis is proposed in this paper. Based on the knowledge representation...
The number of elderly people over 60-year old is expected to reach 2 billion by 2050. With age people experience cognitive decline. While exercises are known to help, one of the age-associated issues is non-adherence. With the increasing adoption of technology by elderly, mobile devices become a good channel to deliver a persuasive solution. In this paper, we discuss the design and evaluation of Adherence...
We present an approach to tracking the behaviour of an attacker on a decoy system, where the decoy communicates with the real system only through low energy bluetooth. The result is a low-cost solution that does not interrupt the live system, while limiting potential damage. The attacker has no way to detect that they are being monitored, while their actions are being logged for further investigation...
Common hospital monitoring set up includes nurses taking rounds throughout their assigned wards and checking the patient's vital signs. This process is very time consuming and prone to human errors, especially for large scale hospitals. As a solution, an Internet of Things (IoT) based pulmonary monitoring system was proposed. The system uses a single-lead heart rate sensor connected to a microcontroller...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.