The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to their social influence, several areas research search and rescue field. Mobile robotics is one of them that analyzes and seeks more efficient solutions for search and rescue operations. Multirobot systems are considered to make the procedures more efficient and safe, both for the victim and for the crew. Petri nets are widely diffused for designing discrete events systems, such as networks...
In the future intelligent transport systems (ITS) the reliability and precision of the cooperative and autonomous vehicles are of the utmost importance. For such systems vehicle-to-vehicle and vehicle-to-infrastructure (V2X) communications is safety-critical component of ITS. Many mobility and convenience applications of ITS require the V2X bidirectional communications mode. This paper focuses on...
In this study, we use wearable devices to monitor the health and physiological indicators of the elderly, and analyze the effects of the elderly's walking steps and sleep as the measurable health and physiological indexes. Eighteen cases of the elderly who received health management services are selected. We establish the generalized linear mixed model, and Pearson correlation analysis result shows...
Internet scale continues to expand, the IPv6 protocol standard is implemented in the network gradually, make the behavior characteristic of the network become more changeful and more unstable, so it can be more detailed to carry on network situation perception system according to network data stream to become the next research direction. The support of IPv6 Network Situation Awareness system is realized...
With the rapid development of the business and the continuous improvement of the level in SGCC, the security research in the mobile field has been paid more and more attention. Although mobile work terminals can improve the efficiency of field operations, but a large number of mobile terminal access, leading to the terminal management difficult to increase, security has been greatly challenged. Therefore,...
In this paper, we report on a method of finding lot defects and the results of a verification related to the maintenance of power-supply and air-conditioning equipment for ICT. We built a logic and models to automatically detect equipment that may be included in a defective lot. An equipment anomaly analysis system was constructed. For verification, actual past lot failure equipment was applied to...
There are proposed company's capital structure models that can be used in an automated monitoring system and preliminary analysis of the risks of the company's assets financing. It is developed classification of the main structures of assets financing.
Training and retraining of experts oriented to the work in the Analytical Centers requires the use of modern training technologies. It is promising to create and integrate into the Analytical Center structure an Intelligent Training System that provides dynamic experts training in a mixed (offline / online) information space, taking into account their motivation, level of education, information and...
The paper considers the problem of change detection and diagnosis (CDD) in vibration analysis, from the point of view of challenges and solutions. In this framework, Matlab Toolbox VIBROTOOL is presented, implementing functions for change detection and diagnosis in vibration engineering. Compared to other toolboxes in the same domain, Matlab VIBROTOOL Toolbox promotes blind source separation and advanced...
Efficient management of water resources is a growing global concern. In Brazil, most regions deal with problems related to high rates of water loss in distribution systems. This situation involves a complex environment with multiple decision-makers, several alternatives, and subjective variables. Therefore, its evaluations require interactivity, clarity, learning, and that plausible aspects be discerned...
On-line detection technology on abrasive particles in lubricating oil liquid is of great significance to evaluate the working or fault state the mechanical equipment, the paper based on the reverse-double-excitation solenoid wearing debris sensor model, the theoretical analysis and finite element simulation of the sensor are carried out, and the results of the two methods are consistent. As the radius...
The human immune system is incredibly efficient at identifying self- and non-self entities in our bodies. A non-self entity (malicious), once identified, is attacked by particular types of cells to remove the intruder before it can cause damage. Our immune system has components that identify not only non-self entities but also recall old entities that may not have been encountered for a very long...
In ultrasonic NDE applications, the received signal carries valuable physical information along the wave propagation path such as locations, orientation and sizes of discontinuities. Various signal processing algorithms have been utilized to interrogate ultrasonic echoes, highly overlapped and sometimes noise-contaminated. As of assessing and monitoring the in-situ outsized structures, it becomes...
An innovative cyber culture and computing of social governance of citizens is proposed, aimed at the moral metric cloud service of social groups through the leverage of digital monitoring and expert evaluation of social processes and phenomena. Cyber culture is defined as the development level of social, technological, moral and material relations between society, the physical world and cyberspace...
This article reports on our experiences in applying formal methods to verify the security mechanisms of Android. We have developed a comprehensive formal specification of Android's permission model, which has been used to state and prove properties that establish expected behavior of the procedures that enforce the defined access control policy. We are also interested in providing guarantees concerning...
The presented research is carried out within the framework of a global industrial project “Electro-Mechanical Actuator Health Management” with french company CERTIA. The objective is the realization of an auto-diagnosis embedded module for health monitoring and reconfiguration of Electro-Mechanical Actuator (EMA) including two operating modes: Test checking before taking off (evaluation and health...
The design of today's systems on chip (SoC's) raises difficult issues, in particular regarding verification. In their early design phases, hardware/software embedded systems are commonly described as ESL (Electronic System Level) models, such that their functional and transactional behavior can be analyzed by simulation. To enhance this validation process, we have previously developed a framework...
A major challenge for the European electronic industry is to enhance productivity while reducing costs and ensuring quality in development, integration and maintenance. Model-Driven Engineering (MDE) principles and techniques have already shown promising capabilities but still need to scale to support real-world scenarios implied by the full deployment and use of complex electronic components and...
The survey of related works on insider information security (IS) threats is presented. Special attention is paid to works that consider the insiders' behavioral models as it is very up-to-date for behavioral intrusion detection. Three key research directions are defined: 1) the problem analysis in general, including the development of taxonomy for insiders, attacks and countermeasures; 2) study of...
Aiming at the accurate prediction of APU residual life in civil aviation, Fusion of historical state performance monitoring data, a method of APU residual life prediction based on proportional hazards model (PHM) is proposed. This method first gives a life prediction algorithm based on PHM. Then, based on the historical performance degradation data and historical failure time data, the genetic parameters...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.