The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider the energy-efficient coordination of a set of appliances in a smart-building. We introduce a theoretical formulation of the coordination problem and an Integer Linear Programming model for its resolution. Our formalization is complemented by an analysis of the properties and limits of the model. We also define a practical smart-building setting in which our formalization...
Due to massive advantages of short range communication technologies such as NFC and RFID, they are ubiquitously utilized in many fancy and sensitive applications. During last decade, there have been impressive endeavors to design efficient authentication protocols which can provide secure and anonymous communication for end-users. In this research, we formally analyze a recently improved authentication...
Lack of healthcare infrastructure has caused millions of deaths in developing countries. People in such countries generally suffer from infectious diseases and are denied treatment at appropriate time or not warned about emerging epidemics. This mainly happens because of poor establishment of public health services, lack of access to health statistics and nonexistence of precise medical data. The...
Technicolor has been investigating how Mixed Reality technology could impact the future of home entertainment. We have designed and implemented a system to extend a standard TV experience with AR content, using a consumer tablet or a headset. A virtual TV mosaic is displayed around the TV screen and used as a GUI to control both TV and MR content. Using this interface, the user is able to switch TV...
Event logging is a key source of information on a system state. Reading logs provides insights on its activity, assess its correct state and allows to diagnose problems. However, reading does not scale: with the number of machines increasingly rising, and the complexification of systems, the task of auditing systems' health based on logfiles is becoming overwhelming for system administrators. This...
When a standard TCP implementation using the minimum retransmission timeout (RTOmin) of 200 ms is used in distributed file systems in data centers, a well-known throughput degradation called TCP Incast occurs, because 200 ms is too large as an RTOmin in data centers. In order to avoid TCP Incast, a TCP implementation using a much smaller RTOmin attained by a fine-grained kernel timer is proposed....
This paper is based on the experiences with implementation of information systems within preparation to deal with crisis situations in terms of crisis management in the Slovak Republic with Introduction to the state of the art, the Unified Information System of Economic Mobilization and Development in Slovakia of the Program and Information System — EPSIS®JISHM. We also focus on new challenges in...
Cyber-Physical Systems (CPSs) may fail during runtime on supporting decision making if they are not capable of detecting and correcting their own failures. Thus, it has been proposed that CPSs should be self-aware, context-aware and goal-aware. In this paper we present preliminary results about how an architecture built over the Extensible Messaging and Presence Protocol (XMPP) may implement a distributed...
The Open University of Japan (OUJ) and National Institute of Informatics (NII) have started collaborative study for learning analytics. OUJ is the largest distance education institution in Japan. In the academic year of 2015, OUJ launched interactive online courses. One of the essential features of online courses is the possibility to collect and analyze educational big data. To utilize such educational...
Internet of Things (IoT) is slowly taking over the world where its predicted that by 2025, it will grow to 1-3 trillion connected machines/devices. With large scale deployments, maintaining these devices is a seeming burden on the operations. Also, with huge deployments of IoT devices, most concerns center around privacy and security. To reduce the efforts of on-field maintenance and to perform such...
Fraud prevention in the banking sphere is a very important type of activity which can cover a whole range of fraud schemes — both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of the system of monitoring and analysis of threats...
Standard applications are unable to perform well in delay- and disruption-tolerant networks (DTNs) due to frequent lack of end-to-end connectivity and long communication delays. Such applications must be thus adapted to be able to operate in disadvantageous network conditions. In a previous work on adapting standard tactical applications for DTN networks, we proposed how such an adaptation may be...
This paper presents the development of an Indigenous On-Board Diagnostic Kit and a remote on-line diagnostic system for Euro standard vehicles using On-Board Diagnostics (OBD) and GSM technology. The different parts of the system are indigenous developed OBD Kit, Communication Module and GUI for main server. The vehicles are equipped with OBD kits and communication modules with GSM, The Electronic...
The weighted k-server problem is a natural generalization of the k-server problem where each server has a different weight. We consider the problem on uniform metrics, which corresponds to a natural generalization of paging. Our main result is a doubly exponential lower bound on the competitive ratio of any deterministic online algorithm, that essentially matches the known upper bounds for the problem...
Human Activity Recognition (HAR) is a critical technology for seniors home care. In this paper, we present the system implementation and experimental study on detection of both of the daily activities and accidental event (Fall Down) with multiple inertial sensors on body. The overall accuracy are 94.3% on recognition of 10 kinds of daily activities with kNN in user-independent evaluation. Moreover,...
Recently, due to rapid development of information and communication technologies, the data are created and consumed in the avalanche way. Distributed computing create preconditions for analyzing and processing such Big Data by distributing the computations among a number of compute nodes. In this work, performance of distributed computing environments on the basis of Hadoop and Spark frameworks is...
With the development of cloud computing, storage of whole world started shifting to the cloud. Management and security of such a large data was very difficult, to lower the security issues, Tokenization was developed, but for maintaining the security and safety of the Tokenization servers, there was need of a strong encryption algorithm. This paper presents Next Generation Encryption Algorithm, a...
Paper presents a solution providing OPC UA connectivity from a common web user using web technologies. Integration of OPC UA with the web may represent an important contribution to enhance its interoperability, allowing integration with web applications, IoT and WoT. The main difference with the solutions available in literature is that user may have no knowledge of OPC UA standard. A web-based platform...
This paper proposes the service discovery and the remote control for Internet-of-Things (IoT) devices based on the Constrained Application Protocol (CoAP) and Domain Name System (DNS). As the number of devices increases, the manual configuration of domain names and services might be unmanageable for users. A legacy DNS Name Autoconfiguration (DNSNA) for IPv6 networks can be used to register the DNS...
In this paper, we develop a method to encapsulate and embed interactive 3D volume rendering into the standard web Document Object Model (DOM). The package we implemented for this work is called Tapestry. Using Tapestry, data-intensive and interactive volume rendering can be easily incorporated into web pages. For example, we can enhance a Wikipedia page on supernova to contain several interactive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.