The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This demo showcases some of the capabilities foreseen for the security infrastructure designed by the H2020 SHIELD project. SHIELD exploits NFV for adaptive monitoring of an IT infrastructure and for feeding the data to an analytics engine to detect attacks in real time. An intelligent reaction system is then activated to reconfigure the SDN/NFV infrastructure so that the attacks are thwarted. The...
Scientific research is data-centric, relying on the acquisition, management, movement, analysis, and sharing of data. Proficiently managing the end-to-end lifecycle of scientific data is non-trivial and comprises many time consuming and mundane tasks. While individual tasks are not prohibitive, when done repeatedly and frequently they represent a significant strain on researchers. We posit that a...
Crowd-based requirements engineering (CrowdRE) is promising to derive requirements by gathering and analyzing information from the crowd. Setting up CrowdRE in practice seems challenging, although first solutions to support CrowdRE exist. In this paper, we report on a German software company's experience on crowd involvement by using feedback communication channels and a monitoring solution for user-event...
Many games use dynamic difficulty adjustment (DDA) to promote the achievement of flow and consequent positive affective states. However, performance based DDA assume a specific ludic attitude: that of the hard-core gamer. An alternative approach is to apply affective computing techniques to monitor players adjust difficulty to achieve the desired affective state directly. Such an emotion-controlled...
Byzantine attacks are constant threats in many applications such as disaster management, and battlefield applications. In this paper, we introduce a monitoring scheme in the link state routing protocol to secure the packets' route against Byzantine attacks. The goal of our proposed scheme is to guarantee communication among connected benign nodes in the network. Specifically, each node monitors the...
With the flexibility and programmability levels offered by Network Functions Virtualization (NFV), it is expected to catalyze the upcoming “softwarization” of the network through software implementation of networking functionalities on virtual machines (VMs). While looking into the different issues thrown at NFV, numerous works have demonstrated how performance, power consumption and, consequently,...
Fully assessing the robustness of a software application in-house is infeasible, especially considering the huge variety of hardly predictable stimuli, environments, and configurations that applications must handle in the field. For this reason, modern testing and analysis techniques can often process data extracted from the field, such as crash reports and profile data, or can even be executed directly...
Autonomous Systems are systems situated in some environment and are able of taking decision autonomously. The environment is not precisely known at design-time and it might be full of unforeseeable events that the autonomous system has to deal with at run-time. This brings two main problems to be addressed. One is that the uncertainty of the environment makes it difficult to model all the behaviours...
Haze has becoming a yearly occurrence in Malaysia. There exist three dimensionsto the problems associated with air pollution: public ignorance on quality of air, impact of air pollution towards health, and difficulty in obtaining information related to air pollution. This research aims to analyse and visually identify areas and associated level of air pollutant. This study applies the air pollutant...
This paper presents a wireless Andon system based on Zigbee. The system realizes wireless transmission of Andon information in special construction lines and has some functions including production monitoring, wireless calling and statistics report. Radio frequency technology of ZigBee is adopted by the system to realize wireless communication. Users can accurately convey demand information from Andon...
Network is the direction of development for industrial control, application of PROFIBUS-DP network consisting of S7-300 PLC S7-200 PLC produced by Siemens is becoming more and more widely. WinCC is powerful PC monitoring configuration software, often need to read and write datum of master-slave PLC in the network. This paper discusses the method of direct communication between WinCC and master-slave...
CoSSMic (Collaborating Smart Solar powered Micro-grids) is an EU funded project. It aims to develop both hardware and software which will include an ICT system for smart management and control of generated/consumed solar energy in neighbourhood communities. The creation process of energy monitoring and controlling of Graphical User Interfaces (GUIs) is described here. User Centred Design Workshops...
Network service providers are facing challenges for deploying new services mainly due to the growing complexity of software architecture and development process. Moreover, the recent architectural innovation of network systems such as Network Function Virtualization (NFV), Software-defined Networking (SDN), and Cloud computing increases the development and operation complexity yet again. One of the...
Senior citizens may suffer from a number of diseases, including but not limited to mild dementia and cognitive disabilities, which require either the institutionalization or the constant support from care-givers. To successfully help the senior citizens, usually a monitoring system is needed that can gather and process data from various sensors about the healthcare condition of the user and environment...
The focus of this paper is a discussion on the organizational integration of BDIM activities into an IT infrastructure. In particular, this paper provides a definition of the usefulness of a center of excellence within information systems, its structure and measurement of capabilities. The organizational capabilities pertaining to BDIM can be measured through the introduction of a maturity model,...
Pervasive systems present stringent requirements that make software deployment especially challenging. The unknown and fluctuating environment in which pervasive applications are executed discards traditional approaches. As a result, there is an increasing need for a reproducible and dynamic deployment process. In last years, we developed several industrial pervasive platforms and applications. Based...
Permissions-based security model of Android increasingly shows its vulnerability in protecting users' privacy information. According to the permissions-based security model, an application should have the appropriate permissions before gaining various resources (including data and hardware) in the phone. This model can only restrict an application to access system resources without appropriate permissions,...
In this paper, a respiratory carbon dioxide (CO2) measurement device has been designed and introduced for home monitoring applications. Typically, peak flow meter is used to monitor the severity of asthma. In order to use this device, the patient needs to inhale a full, deep breath in, and then blast it out as hard and fast as possible until there is no more air left to expel from his/her lungs. Besides...
oscilloscope is used to measure the voltage ripple in PLTP Darajat, but experienced problems because the oscilloscope can not measurred simultaneously as many as 40 points measuring. In this paper, we will show the results of the design and implementation of the PLC to measure the ripple voltage total of 40 measuring points simultaneously. This research was implemented in geothermal power plants Darajat...
Companies that develop software are increasingly competitive. To learn how these firms are competitive need to measure the productivity of their software development processes (SDP). Knowing how to control productivity, the company is better able to predict various parameters and estimate their projects more closely the actual value of the projects. The project manager must monitor how the productivity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.