The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent advances in hardware and software of cloud computing are putting tremendous pressure on the administrators who manage these resources to provide uninterrupted services. Monitoring cloud computing plays a significant role in enhancing the quality of cloud computing services. Regular monitoring may help to adaptively scale resource utilization and determine service problems. It also helps to...
Network Intrusion Detection Systems (NIDSs) play a crucial role in detecting malicious activities within the networks. Basically, an NIDS monitors network flows and compares it with the pre-defined suspicious patterns. To be effective, different intrusion detection algorithms and packet capturing methods have been implemented. With rapidly increasing network speeds, NIDSs face a challenging problem...
Gait velocity has been considered the sixth vital sign. It can not only be used to estimate the survival rate of the elderly but also to predict the tendency of falling. Unfortunately, gait velocity is required to be measured using specially designed walk path with minimal walk distance, which has to be conducted at clinics or health institutes. Wearable tracking services using accelerometer or inertial...
Based on in-depth research on the structure of train operation dispatching command system (TDCS) and its operation maintenance status, a TDCS integrated operation and maintenance platform is designed in this paper. This platform realizes real-time monitoring of the computers, network equipment, databases, software and hardware and other infrastructure based on the businesses, effective pre-alarm for...
There has been a growing trend in recent years to outsource various aspects of the semiconductor design and manufacturing flow to different parties spread across the globe. Such outsourcing increases the risk of adversaries adding malicious logic, referred to as hardware Trojans, to the original design. In this paper, we introduce a run-time hardware Trojan detection method for microprocessor cores...
Prognostic diagnosis is desirable for commercial core router systems to ensure early failure prediction and fast error recovery. The effectiveness of prognostic diagnosis depends on whether anomalies can be accurately detected before a failure occurs. However, traditional anomaly detection techniques fail to detect “outliers” when the statistical properties of the monitored data change significantly...
With the rapid advances in IoT technologies, the role of IoT gateways becomes even more important. Therefore, improving the reliability, availability and serviceability (RAS) of IoT gateways is crucial. Nowadays, Linux is widely adopted for core enterprise systems not only because it is a free operating system but also because it offers advantages in regards to operational stability. With many Linux...
Cameras and other sensors are increasingly deployed for private space monitoring applications such as home monitoring, assisted/enhanced living and child monitoring. Since these cameras capture highly sensitive information and transfer it over public communication infrastructures, security and privacy is a major concern. This work presents a secure camera device along with a secure data delivery and...
The paper presents a system that uses Laboratory Virtual Instrument Engineering Workbench (LabVIEW) software to monitor, and to control the state of an electrical machine depending on user imposed limits. In this system, the real-time variables of an electrical machine are measured and transferred to a controller (PC) through Data Acquisition Card (DAQ). The NI USB 6009 DAQ is selected for this project...
Threats within the network are a security risk with which you deal daily. Due to this, the use of more complex means of security than the Firewall should be considered to perform the analysis of the traffic behavior of the network by means of devices of next generation such as Systems of Detection and Prevention of Intrusions (IDPS). This article presents a comparison of commercial systems and open...
This paper considers architecture and functionality of the embedded data acquisition system for automated beehive monitoring. A description of constructed sensor subsystems is given. Proposed solution acquires hive temperature, humidity and weight referring this data to the mobile application via wireless network. The system also performs an analysis of collected bee noises with artificial neural...
Active learning has demonstrated value in STEM education and various meta analyses show improvements in student performance when making use of active learning pedagogy and active learning classrooms. One limiting factor to extending the reach of active learning is cost. Many models for state-of-the-art active learning environments make use of tools and infrastructure through which students can connect...
Some approaches and techniques that allow conducting of complex physiological research using closed-architecture measurement systems of different manufacturers are discussed. The experience in developing a system with flexible configuration and in solving arising problems by virtue of integration of equipment using an external synchronizing device, is described. Parallels are drawn with the modern...
Energy Harvesting is a solution for continued operation of WSNs without depending on batteries. This paper introduces REAPer, an adaptive energy harvester for microsources that can be configured and monitored by the supplied WSN node. We combine REAPer with an IdealVolting capable sensor node that can fully exploit the monitoring and control capabilities of REAPer. The efficiency and overhead of the...
Using automatic instead of automated tools is assumed to significantly reduce timing budgets needed for the actualization. However, it seems to be not always the case, especially if we consider the complete actualization cycle. The article presents an investigation of the time needed for the information base actualization when using separate automated or automatic tools, as well as the time needed...
In this paper, we design a novel two-channel sphygmus monitoring system, which can synchronously measure the pulse signals and their difference one from radial artery and ulnar artery. This system uses the CM-01B vibration sensor as a sphygmus sensor, utilizes the WiFi module to transmit data, makes use of the PC software to process and display real-time data of sphygmus. The pint-sized and portable...
In the context of Industry 4.0, constantly evolving shop floors generate the need for a highly adaptive and autonomous automation system with lean maintenance, minimum downtime, maximum reliability, and resilience. Future Manufacturing Execution Systems (MESs) will be more complex and dynamic as well as distributed physically and logically. This makes it very difficult, if not impossible, for the...
Virtualization technology is well established in the server and desktop spaces, and has been spreading across embedded system market. This technology allows for the coexistence and execution of multiples operating systems on top of the same hardware platform, with proven technological and economic benefits. Hardware extensions for easing virtualization have been added into several commercial off-the-shelf...
Due to technology scaling, which means smaller transistor, lower voltage and more aggressive clock frequency, VLSI devices are becoming more susceptible against soft errors. Especially for those devices deployed in safety- and mission-critical applications, dependability and reliability are becoming increasingly important constraints during the development of system on/around them. Other phenomena...
In view of short distance, inaccurate counting and slow speed of the intelligent meter reading system, the design scheme of a remote intelligent meter reading system based on GPRS is put forward. The hardware of system mainly includes four parts: GPRS wireless communication module, concentrator, collector, and monitoring center. The communication layer adopts double layer structure, the upper layer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.