Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this work we report experimental tests on the performance of FTTX accesses using the mPlane measurement plane, including lab and field environments and above all we point out the role of such measurement plane in Software Defined Network architectures. For such an aim we show an experimental procedure based on a central unit (orchestrator) that automatically manages GbE links in a regional network...
This demo showcases some of the capabilities foreseen for the security infrastructure designed by the H2020 SHIELD project. SHIELD exploits NFV for adaptive monitoring of an IT infrastructure and for feeding the data to an analytics engine to detect attacks in real time. An intelligent reaction system is then activated to reconfigure the SDN/NFV infrastructure so that the attacks are thwarted. The...
In this paper, we propose and evaluate the application of unsupervised machine learning to anomaly detection for a Cyber-Physical System (CPS). We compare two methods: Deep Neural Networks (DNN) adapted to time series data generated by a CPS, and one-class Support Vector Machines (SVM). These methods are evaluated against data from the Secure Water Treatment (SWaT) testbed, a scaled-down but fully...
Service Assurance (SA) is a significant part of Network Function Virtualization (NFV) to enable automated and efficient service delivery from end to end (E2E). In NFV, SA should be integrated into the design and development loop from the beginning. However, it sees slower pace than other NFV management and orchestration (MANO) components. Most of present NFV-SA solutions are partial and do not provide...
In this paper we propose oil skimmer monitoring system by user-controlled smart phone IoT(Internet of Things)-specific controller and built in BLE 4.0. The device Hardware of the IoT is the trend of OSHW(Open Source Hardware). This opens up free design content for physical artifacts together spirit with FOSS (Free and Open Source Software). As a result of the derivation of Open-source culture making...
Resistive RAM (ReRAM) is an attractive candidate for next generation embedded nonvolatile memory [1][2], with several advantages compared to conventional flash technology. First, ReRAM is a CMOS-compatible low temperature back-end of line (BEOL) memory. There is almost no mutual impact between ReRAM element and front-end CMOS devices during the wafer processing. Second, it only needs 2∼4 extra masks,...
In this paper, we report on a proof-of-concept wearable prototype, called iSeiz, that can detect specific seizure activity, namely generalized tonic-clonic, in epilepsy patients. We first describe the high-level architecture of iSeiz, and then elaborate on its hardware and software features, including its robust and low-computational intensive real-time seizure detection algorithm (SDA), as well as...
Smart city has been advanced much from the conceptual model to the actual construction stage. This paper takes Nanhai as an example to demonstrate how to manage the resources of IoT as a whole and plan the top-level design of IoT development and smart city. After analysis of Nanhai IoT status, a general framework of Nanhai IoT development is proposed as the top-level design using five architectures...
Smart grid software integrates various software components in Generation, Transmission, Distribution, Smart Metering and Cloud systems. The smart grid architecture is evolving with new features and to accommodate legacy software elements. Smart grid integrated software is an evolving approach in line with modern Information and Communication technology. In this paper, the authors propose a software...
A new medical system platform utilizing a see-saw commander/follower architecture will be presented. This architecture provides for a high level of therapy control and safety via a supervisory exchange mechanism (see-saw) at various operational phases. During the performance of various functions, one system element obtains supervisory control and acts as the commander while other modules continue...
The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the wave of Information-Centric Networking. Although the NDN's data-plane seems to offer many advantages, e.g., native support for multicast communications and flow balance, it also makes the network infrastructure vulnerable to a specific DDoS attack, the Interest Flooding Attack (IFA). In IFAs, a botnet issuing unsatisfiable...
Despite the great benefits of cloud computing on businesses, some organizations have had to withdraw from its service due to incomplete compliance to conditions from standards, bodies, or Service Level Agreements which have led to their being penalized. A structured and efficient model is helpful to aid small and medium scale enterprises (SMSEs) utilize cloud services safely and ascertain their fitting...
Crude oil remains the major source of revenue in Nigeria. However, Petroleum pipeline vandalism is becoming an issue concern to the government with thousands of liters lost to embezzlement. This work proposed a Multi-Agent based Security System that will provide a lasting solution to this problem by prevention and control. The framework indicates that Multi-Agent System (MAS) technology can be applied...
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
Understanding and predicting cellular traffic at large-scale and fine-granularity is beneficial and valuable to mobile users, wireless carriers and city authorities. Predicting cellular traffic in modern metropolis is particularly challenging because of the tremendous temporal and spatial dynamics introduced by diverse user Internet behaviours and frequent user mobility citywide. In this paper, we...
In the context of Industry 4.0, constantly evolving shop floors generate the need for a highly adaptive and autonomous automation system with lean maintenance, minimum downtime, maximum reliability, and resilience. Future Manufacturing Execution Systems (MESs) will be more complex and dynamic as well as distributed physically and logically. This makes it very difficult, if not impossible, for the...
The connectivity of industrial automation domain systems has been enhanced by the employment of information and communication technologies. This permits the implementation of systems that are aligned with the vision of the fourth industrial revolution, or Industry 4.0. In this scope, Cyber-Physical Systems (CPS), i.e., integration of cyber and physical systems, enables the control and monitoring of...
Existing solar energy harvesting systems are typically evaluated with a single configuration. However, results on different harvester configurations are often desired in order to select the appropriate match to specific ambient conditions and application requirements. In this paper, we therefore present a concept for remotely reconfigurable solar energy harvesting testbeds, which allows for multiple...
Recent developments induced by the Internet of Things (IoT) force a paradigm shift to deploy on demand services to a broad range of different computing architectures. Mainly single board computers (SBCs) gained a lot of attraction in recent years, shifting highly available processing power to service consumers and IoT devices. Simultaneously, container virtualization achieved a breakthrough by the...
Technological advancement of Industrial Control Systems (ICS) and control systems automation over the past decade has brought greater interconnections of the control components. Modern control communication systems such as ModbusTCP are based on open standards that leverage Ethernet to allow interoperability between solutions from different vendors. The enhanced exchange of information has, as a side...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.