Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Overhead distribution lines are usually subject to voltage transients during thunderstorms. Lightning flashes, whether direct or indirect, are one of the main causes of power quality disturbances on the electric grid. In this paper, a methodology to establish a correlation between the incidence point of a lightning flash, the stroke current amplitude and polarity and its effects on the electric distribution...
The human immune system is incredibly efficient at identifying self- and non-self entities in our bodies. A non-self entity (malicious), once identified, is attacked by particular types of cells to remove the intruder before it can cause damage. Our immune system has components that identify not only non-self entities but also recall old entities that may not have been encountered for a very long...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
Computerized systems employed for the analysis of cardiotocographic signals have become almost indispensable tools in fetal monitoring, for which evaluation of fetal heart rate signals plays a key role. Consequently to the diffusion of these systems, new software and complex signal processing methodologies are spreading and are gaining more and more interest. For testing the performances of new software...
Although it is possible to design and manufacture MPSoCs with hundreds of processors, there is still a gap in the ability to debug hardware, software, and applications for such chips. Current state-of-the-art works related to MPSoC debugging suffer from poor integration, scalability in data storage, and simple graphical data representation. This work proposes a modular debugging framework to aid the...
The use of virtual patching tools to prevent attackers exploiting vulnerabilities of a web application is a widely adopted defensive approach. The constant evolution of applications, and thereby of attack techniques, requires a big maintenance and tuning effort to ensure that the remediation patches are working correctly. We put forward in this paper a tool supported process here security requirements...
Diagnosis and monitoring of Parkinson's disease has a number of challenges as there is no definitive biomarker despite the broad range of symptoms. Research is ongoing to produce objective measures that can either diagnose Parkinson's or act as an objective decision support tool. Recent research on speech based measures have demonstrated promising results. This study aims to investigate the characteristics...
We asset about the analysis of electrical appliance consumption signatures for the identification task. We apply Hidden Markov Models to appliance signatures for the identification of their category and of the most probable sequence of states. The electrical signatures are measured at low frequency (10−1 Hz) and are sourced from a specific database. We follow two predefined protocols for providing...
Monitoring represents an important factor in improving the quality of the services provided in cloud computing, given the fact that it allows scaling resource utilization in an adaptive manner. It is widely used for detecting critical events and abnormalities of distributed systems and also it helps identifying the faults within the system, discovering application patterns for the users. As cloud...
Mobile Money Transfer (MMT) services provided by mobile network operators enable funds transfers made on mobile devices of end-users, using digital equivalent of cash (electronic money) without any bank accounts involved. MMT simplifies banking relationships and facilitates financial inclusion, and, therefore, is rapidly expanding all around the world, especially in developing countries. MMT systems...
Popularity of Cloud Computing produced the birth of Everything-as-a-Service (XaaS) concept, where each service can comprise large variety of software and hardware elements. Although having the same concept, each of these services represent complex system that have to be deployed and managed by a provider using individual tools for almost every element. This usually leads to a combination of different...
The service cloud model allows for the composition of services into an application that can respond to tenant requests. The composition of services, which may originate with different vendors, results in a service chain that supports end-to-end round trip messaging. Thus, the service cloud model must support provisioning services for the request without incurring a conflict of interest (COI) in their...
Self-diagnosis is a fundamental capability of self-adaptive systems. In order to recover from faults, systems need to know which part is responsible for the incorrect behavior. In previous work we showed how to apply a design-time diagnosis technique at run time to identify faults at the architectural level of a system. Our contributions address three major shortcomings of our previous work: 1) we...
The use of wireless links renders a vehicular ad-hoc network (VANET) vulnerable to malicious attacks such as Denial of Service, blackhole attack, Sybil attack, selective forwarding and altering routing information. In wired networks the attacker needs to gain access to the physical media to make an attack. In wireless networks the scenario is much different, there are no firewalls and gateways in...
As for the complex electromagnetic environment simulation, this paper propose a parallel computing system based on file segment, this system offers the developer a flexible interface. The paper describes the database design in detail, analysis the performance of the database, therefore offers a base for the complex environment simulation.
Maintaining consistent views of components in complex IT environments is challenging due to frequent changes applied to the systems. Discovery tools, typically used for scanning the environment, can fail to gather up-to-date information. We present a technique to track changes by monitoring system events induced by a change. The system events are associated to entities in a configuration model. A...
Avionics systems perform critical functions in modern aircrafts. Intelligent technologies of prognostics and health management (PHM) are necessary in avionics systems. This paper discussed the architecture of an avionics PHM system, and showed and explained the flowcharts of the logic processes in different levels of the avionics PHM system in detail. A database and a model library needed in the PHM...
Mashups are powerful applications created from accessing and composing multiple and distributed information sources. Their ease-of-use and modularity allow users at any skill level to construct, share and integrate their own applications. However, data security concerns remain a hindering factor in its widespread adoption, in particular, for network management. In this paper, we propose a novel development...
Web sites are often a mixture of static sites and programs that integrate relational databases as a back-end. As they evolve to meet ever-changing user needs, new versions of programs, interactions and functionalities may be added and existing ones may be removed or modified. Web sites require configuration and programming attention to assure security, confidentiality, and trust of the published information...
Resources sharing is the main concerns of grid computing. With an in-depth study of the grid resource management models, a five-layer grid resource management model is proposed to deal with the problems and defects of grid resource management. The hierarchy structure of the model can not only mask the diversity of grid resources, but also increase the security of sharing, thus achieving the scalability...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.