Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper proposes a network reconfiguration methodology for the three-phase unbalanced distribution system under both the normal operating and post-fault conditions. In normal operating condition, network reconfiguration is performed for real power loss minimization whereas, in the post-fault condition, reconfiguration is performed for faulty line isolation considering maximum demand should be met...
Physical unclonable functions (PUFs) have become commercially available for anti-counterfeiting and authentication applications. PUF circuits are built on ASICs but can be implemented on FPGAs. For many electronic products, FPGAs are used in order to shorten development periods and reduce costs. Therefore, implementing PUFs on FPGAs can improve security in nearly all electronic products. However,...
Late life failures in software occur primarily due to certain Triggers that are inadequately present in the development and test processes. Triggers surface faults that are otherwise dormant driven by workloads, configurations, traffic, etc. This case study presents Trigger and Impact distributions across five stages of testing in development and early customer trials. These distribution changes and...
Transmission techniques based on channel coding with feedback are proposed in this paper to enhance the security of wireless communications systems at the physical layer. Reliable and secure transmission over an additive noise Gaussian wiretap channel is investigated using Bose-Chaudhuri-Hocquenghem (BCH) and Low-Density Parity-Check (LDPC) channel codes. A hybrid automatic repeat-request (HARQ) protocol...
Research objects were designed in data-intensive science under the premises of interoperability and machine-readability to describe scientific processes and findings including all the resources that were used in the research endeavour. In this poster we present our work with Earth Science communities, that have embraced the research object model for long-term preservation and reuse of knowledge, to...
Previous research indicated that persuasive messages contain appeals that match readers' personal traits can change people's attitudes more. However, the relationship between culture matching and the Elaboration Likelihood Model, which is closely related to people's attitudes, is still a question to be studied. Our study specifically focuses on the mechanism behind matching the individualism-collectivism...
The article presents an analysis of correlation-based clustering procedure in cooperative spectrum sensing. The motivation is to assess if it is more beneficial in terms of energy efficiency to group nodes according to the received signal-to-noise ratio (SNR) on the link between Primary User and node or according to the distance between nodes. To this end, a merged clustering measure is introduced...
Computer-mediated negotiation is characterized as an interactive communication and decision-making process between at least two individuals using a digital environment. The negotiators' behavior — which can be described in terms of negotiation style or conflict management — often changes when negotiators interact with other parties in a negotiation. This study considers a negotiation support system...
This paper describes our blockchain architecture as a new system solution to supply a reliable mechanism for secure and efficient medical record exchanges. The Advanced Block-Chain (ABC) approach was designed to meet the demands in healthcare growth as well as in the new form of social interactive norms. It is going to revolutionize the e-Health industry with greater efficiency by eliminating many...
This paper proposes an in-vehicle power line communication (PLC) system which provides an in-vehicle communication for the video and vehicle messages transmission as a reliable alternative networking medium. The proposed in-vehicle PLC system adopts an existing in-vehicle 12-V battery power system, which means we don't need an external DC power supply for in-vehicle communication equipment to achieve...
Virtual cell (VC) is an emergent concept in cellular networks that shifts the base-station-centric point of view to a user-centric one. Instead of traditional base station assignment, VCs contain a number of transmission points with an association pattern that is created for, and moves with, every user in the network. This study targets VCs for vehicle-to-everything (V2X) communications, where V2X...
Demand Side Management (DSM) has been become a popular option for improving electricity system operations and reliability. Moreover, Demand Response (DR) programs provide superior efficiency and flexibility to their users. This paper proposes a method to assess system reliability and evaluate the specific contributions made by spinning reserves (SR) and DR. The method structurally and spatially decomposes...
In this paper, we address the problem of evaluating the aggregated services offered to the user through a multimodal travel planner. The effective design of a multimodal travel planner is considered a complex task since it requires the identification of the best possible route that combines segments of different transport modes. We describe a novel architecture and its respective connectivity infrastructure...
Analyses of the interactions among quality requirements (QRs) have often found that optimizing on one QR will cause serious problems with other QRs. As just one relevant example, one large project had an Integrated Product Team optimize the system for Security. In doing so, it reduced its vulnerability profile by having a single-agent key distribution system and a single copy of the data base – only...
Based on the LEACH protocol and the Single-hop protocol, this paper proposes a new method to predict the lifetime and reliability of wireless sensor network directly. That is to say, the sensor nodes can be directly deployed without further simulation. Through a series of experiments to compare the two protocols have been several key conclusions: With the increase in sensor density, although the LEACH...
Discovering the causal relationship from the observational data is a key problem in many scientific research fields. However, it is not easy to discovery the causal relationship by using general causal discovery methods, such as constraint based method or additive noise model, among large scale data, due to the curse of the dimension. Although some causal dividing frameworks are proposed to alleviate...
Provides an abstract for each of the tutorial presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
Online Social Networks (OSNs) have become a rewarding target for attackers. One particularly popular attack is the Sybil attack, in which the adversary creates many fake accounts called Sybils in order to, for instance, distribute spam or manipulate voting results. A first generation of defense systems tried to detect these Sybils by analyzing changes in the structure of the OSN graph---unfortunately...
This paper deals with the idea of developing new philosophies for the reliability assessment of additive layer manufacturing (ALM) parts. ALM is a disruptive new manufacturing method by which components are created adding material layer after layer, allowing for the design and production of complex geometries, unthinkable with the use of traditional subtractive machining methods. Thinking ALM means...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.