The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For many existing inspection class ROV designs, a powered umbilical was the obvious choice as a means of providing system power. But advances in battery capability, coupled with the sheer diversity of applications and associated task requirements for which ROVs are now being targeted, has resulted in an interesting tradeoff between the capabilities of umbilical versus battery power. This paper will...
With the development of civilization into urban areas, agriculture has been forced to adapt to less space and limited resources. Developments in urban farming and robotics have produced the personal food computer, a device producing a controlled environment for hydroponic plant growth. As many pharmaceuticals originate from chemicals found in plants, investigation of chemicals relevant to human health...
By investigating the current situation of university library's digital and informational development, this paper analyzes the opportunities and challenges brought by cloud computing technology to the development of libraries. Two strategies of renting cloud services and building cloud platform are put forward to realize the cloud computing service of Digital Library in big data environment.
Most existing concepts for hardware implementation of reversible computing invoke an adiabatic computing paradigm, in which individual degrees of freedom (e.g., node voltages) are synchronously transformed under the influence of externally- supplied driving signals. But distributing these "power/clock" signals to all gates within a design while efficiently recovering their energy is difficult...
The feasibility of using commercial CMOS processes for implementing scalable cryogenic control electronics for universal quantum computers is investigated. Using a systems engineering approach, we break the system down into sub-systems and model the individual components down to transistor level. First results for area demand and power consumption indicate that even with a standard CMOS process, it...
Recent advances in the development of commercial quantum annealers such as the D-Wave 2X allow solving NP-hard optimization problems that can be expressed as quadratic unconstrained binary programs. However, the relatively small number of available qubits (around 1000 for the D-Wave 2X quantum annealer) poses a severe limitation to the range of problems that can be solved. This paper explores the...
The Twenty-First Century has seen the dawn of the Internet as a pervasive medium by which nearly all information flows. However, the permissive environment in which the Internet was founded fostered a community plagued by Internet trolls, individuals who deliberately post inflammatory, off-topic, or offensive material on online message boards to elicit angst, or other emotions, from their targets...
The article issue is the enterprise information protection within the internet of things concept. The aim of research is to develop arrangements set to ensure secure enterprise IPv6 network operating. The object of research is the enterprise IPv6 network. The subject of research is modern switching equipment as a tool to ensure network protection. The research task is to prioritize functioning of...
Simulation of human bipedal walking through muscle actuation presents an optimization problem with a substantial number of parameters. Calculation of the cost function for this optimization problem, which can be non-differentiable, necessitates significant computational power and resources. In addition, because of the redundant nature of the human musculoskeletal system, the problem is highly prone...
With the enhancement of informatization and automation, the capacity and efficiency of CBTC systems are increasing. However, the wide application of information technologies brings serious security threats on CBTC systems. Due to inherent characteristics of railway services, obtaining the security situation of CBTC systems is necessary. The methodlogy in this paper to evaluate the vulnerability of...
There are fragments in the heart can attributed to innate or diseases that can be seen during the lifetime. As a common term “Arrhythmia” is the name of diseases that anomaly rhythmic work of the heart that result from the various disorders. Electrocardiography is frequently still using by clinics to detect these rhythm disorders. The system base on computers is utilized to minimize interference failures...
In the paper are analyzed articles that are indexed on Web of Science with the main topic of the conference “Communication and Information Technologies” (CIT). The articles were chosen the most cited ones. The first step of analysis summarizes statistics of the articles and the second step was oriented to detailed analysis using the software Tovek Tools. The contextual analysis was depicted in the...
In this study, an embedded system has been developed to provide remote control of dot matrix signboards widely used nowadays. With this developed system, it is possible to control and use one or more signboards anywhere. The developed electronic signboard can be in the desired dimensions by connecting the unit modules in many different forms thanks to the electronic circuit realized for the dot matrix...
The paper proposes a technical procedure for modeling the parameters variation of a fluid flowing through a transport structure. The determined models are used to identify more accurately the leakage points / faults occurring in this infrastructure. The procedure considers faults / leaks that are variable, with minimum and maximum limits being defined. The validation of the procedure is done by implementation...
In this paper, we introduce a defensive cybersecurity framework called Cybergrenade automating various penetration testing tools to sequentially exploit machines connected to a single local network, all underneath a single application running on a Single-Board Computer (SBC). This takes advantage of the SBC's unique capabilities in a way that manual exploitation simply cannot match. Currently, while...
This showpiece will present iSnap, an extension of the block-based, novice programming environment Snap!, which supports struggling students by providing on-demand hints and feedback that help them complete programming assignments. iSnap extends the existing syntactic scaffolding offered by block-based programming to additionally support the implementation of programming tasks. Research on iSnap has...
With the development of technology and industrialization, problems that haven't been solved in the past have become more easily solvable. The artificial intelligence (AI) field has emerged by starting to apply the working mechanism of the human brain in various ways in computers. With the use and widespread use of AI techniques, solutions to problems in every area of the scientific world are presented...
The objective of the PKA encryption scheme is to complement, or replace, existing Public Key Infrastructures (PKI) [1]. In this scheme, the initialization step is based on the secure exchange of addressable cryptographic tables between the communicating parties. These tables are generated either with random numbers, or with arrays of addressable Physical Unclonable Function (PUFs). The subsequent...
Quantum key distribution (QKD) enables two authenticated parties to share secret keys with the ability to detect any attempts to eavesdrop the keys theoretically. Currently, QKD systems can be categorized by its source of uncertainty in nature; single photon or coherent light. As coherent light is harnessed, the overall cost for composing systems drops in general. However, more elaborate post processing...
Almost all college and university courses have integrated disciplines for the teaching of programming in their curricula. The importance of knowing “how to program” has contributed towards increasing private and public initiatives for the teaching of programming in different countries. Many of such initiatives include changes in the curriculum of primary and high schools, replacing disciplines by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.