The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many services are being moved to digital environments with industry 4.0. however, But the information in the digital environment poses a great risk. Ensuring the security of information on the users of online applications is a necessity. This perspective requires safe signal processing. But it is difficult to guarantee safe signal processing for resource constrained devices. Lightweight cryptology,...
This paper investigates the suitability of employing various measurable features derived from multiple wearable devices (Apple Watch), for the generation of unique authentication and encryption keys related to the user. This technique is termed as ICMetrics. The ICMetrics technology requires identifying the suitable features in an environment for key generation most useful for online services. This...
A new turn in information revolution contributed to the formation of a new universal identity of the uniform postindustrial society. We refer to this phenomenon as the concept of a “New axial period”. The system of education, like all cultural institutions, turned out to be not ready for such a breakthrough in creating a new reality that entails certain problems. Among the problems are: pedagogical...
Although Internet of Things (IoT) is an evolving paradigm which allows everyday physical objects, devices and appliances to connect to the internet, and to communicate with each other, there are several essential challenges that should be addressed. One of them is big data generated by physical objects. It is quite challenging to manage and control such enormous amount of data. In this paper, we propose...
We are on the verge of a major shift in the way we perceive digital life, what may cause a significant impact to the real world. Gradually, through increasing knowledge in the areas of artificial intelligence, big data and machine learning, computers have been emulating deceased human beings and, symbolically, with the aid of technology, have been managing to conquer death. This article seeks to understand...
Nowadays, home devices with network capabilities are widely used. The technology integration offers new and exciting opportunities to increase the device connectivity within a home for many proposals of home automation. In this paper, it has been developed a framework that allows to quickly develop new hardware and software complex systems, rapidly integrate new classes of devices in existing systems...
Treadmill is the commonest method to get a good health, but traditional treadmill has limited functions and low intelligence. While embedded technology implements special function and is controlled by internal computer system. Putting embedded technology into treadmill can enhance the intelligence and add extra functions. In this paper, system structure and work way of treadmill were analyzed scientifically...
Novel applications demand computational resources that are provided by multiprocessor systems-on-chip (MPSoCs). At the same time, they increasingly process sensitive data and incorporate security-relevant functions like encryption or authentication. This paper discusses the implications of the MPSoC technology on security. It provides an overview of hardware-oriented techniques to enhance security...
Assisted living and home monitoring systems are gradually becoming a necessity, considering the current trends in population ageing and older adults' desire to continue living independently in their homes and their communities for as long as possible. This paper presents our current achievements regarding the implementation of a cyber-physical system for assisted living and home monitoring, developed...
Large enterprises are moving towards Software Defined Network (SDN) adoption, where business-critical applications are being deployed on top of highly programmable network components and orchestrated by a single or multiple controllers using network protocols, such as OpenFlow or NetConf for communication. Just like in traditional networks, low-cost monitoring solutions need to be developed for SDN...
The features of weight-based sum codes for error detection in channel are discussed in this article. These features are acceptable for modification remote railway controlling systems such as locomotive signalization. In this article proposed the investigation for different coding modification algorithms, made an analysis of noise-immune properties when the modified Bauer code was replaced to modulo...
The accurate measurement of a server's power consumption when running realistic workloads enables characterization of its energy efficiency and helps to make better provisioning and workload placement decisions. Information on the energy efficiency of a server for a given target workload can greatly influence such decisions and thus the final energy efficiency of a cluster or data center. However,...
This paper describes the outcome of a laser attack study on an Android smartphone targeting specifically the secure boot sequence. Laser fault injection has become a classical attack path in the secure chip industry to investigate potential security mitigation. The implementation of such attacks on a recent mobile phone remains relatively unexplored and represents different challenges, both at hardware...
A set of technologies of aggregation for integrating scalar criteria of estimating the efficiency of on-board computer systems is proposed. They based on homogeneity, weighting coefficients of significance, ranges of changes of particular quality parameters. The model is formed belongs to the class of optimization problems. To solve the problem of choosing the optimal alternative, linear, linear-numerical,...
This paper introduces a newly developed Object-Oriented Open Software Architecture designed for supporting security applications, while leveraging on the capabilities offered by dedicated Open Hardware devices. Specifically, we target the SEcube™ platform, an Open Hardware security platform based on a 3D SiP (System on Package) designed and produced by Blu5 Group. The platform integrates three components...
The problems of parallelizing computations and increasing real performance are among the main ones for high-performance computing systems. The article describes a new dataflow computing model and architecture, which allow addressing these problems. Methods for solving other problems of classical dataflow systems and traditional cluster supercomputers by the parallel dataflow computing system are also...
This paper provides a detailed description of developing a power hardware-in-loop (P-HIL) testbed for the simulation and testing of grid-connected battery systems. The test allows not only analyzing the impact of operating grid-tied batteries on the power grid, but also analyzing less addressed battery operational issues, such as temperature, balance, age, and premature capacity loss, as well as the...
Future growth in Distributed Energy Resources (DERs) present growing cybersecurity risks as these devices acquire increased networking and remote control capabilities. In this work the cyber-physical risks of consumer-grade DER are described. The work focuses on studying those DER devices that are network enabled and could be exploited by remote entities. Since attacks can range in both the access...
In order to cope with the rising complexity of today's systems, model-based development of software-intensive embedded systems has become a de-facto standard in recent years. Such a development approach enables a variety of frontloading methods. Design space exploration is one of those techniques. However, in order to properly perform a valid exploration, a system model has to have a certain quality...
The Automotive Open System Architecture (AUTOSAR) has recently beenintroduced to most automotive software in Europe with the aim of reducing the development cost. AUTOSAR is a standardized software platform for automotive softwarethat consists of more than 80 modules with a variety of functions. The real-time operating system (OS) is a module in AUTOSAR that plays a critical role in these modules,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.