The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The development of the Internet functions now affects many activities, talks, meetings, shopping, and learnings. E-Learning is part of the development models of learning that utilizes the internet. The current development model of online learning still needs support and new innovations. Politeknk Elektronika Negeri Surabaya (PENS) has an online learning application that uses the Moodle LMS. However,...
System monitoring is an established tool to measure the utilization and health of HPC systems. Usually system monitoring infrastructures make no connection to job information and do not utilize hardware performance monitoring (HPM) data. To increase the efficient use of HPC systems automatic and continuous performance monitoring of jobs is an essential component. It can help to identify pathological...
This paper evaluates a mechanism for applying machine learning (ML) to identify over-constrained IaaS virtual machines (VMs). Herein, over-constrained VMs are defined as those who are not given sufficient system resources to meet their workload specific objective functions. To validate our approach, a variety of workload-specific benchmarks inspired by common Infrastructure-as-a-Service (IaaS) cloud...
The human immune system is incredibly efficient at identifying self- and non-self entities in our bodies. A non-self entity (malicious), once identified, is attacked by particular types of cells to remove the intruder before it can cause damage. Our immune system has components that identify not only non-self entities but also recall old entities that may not have been encountered for a very long...
A problem in managing the ever growing computer networks nowadays is the analysis of events detected by intrusion detection systems and the classification whether an event was correctly detected or not. When a false positive is detected by the user, changes to the configuration must be made and evaluated before they can be adopted to productive use. This paper describes an approach for a visual analysis...
Nowadays, providing a security system for houses has become a vital research in which the latest technologies are being adopted to serve this purpose. Wireless network is one of the technologies that have been used to provide remote monitor and control for the home appliances. This paper aims to propose a security door lock system based on Raspberry pi technology where cameras, keypad and pi-lids...
In this paper, we explore the task of intellectual information system creation for content formation. We developed the general recommendations for design of the intellectual system. Our system has special modules for processing of information resources. We created the software for formation, control, and implementation of content and made experiments on “Online newspaper” and “Online magazine” systems...
For reliable control of the cardiovascular, respiratory, musculoskeletal systems of the human body must be continuously recorded electro-cardio signal for a long time. Detected and quickly transferred over the wireless channel the most informative pieces of daily electro-cardio signal will allow duty cardiologists for react and provide the necessary medical care to remote cardiac patients. The sequences...
Microservices have become a popular pattern for deploying scale-out application logic and are used at companies like Netflix, IBM, and Google. An advantage of using microservices is their loose coupling, which leads to agile and rapid evolution, and continuous re-deployment. However, developers are tasked with managing this evolution and largely do so manually by continuously collecting and evaluating...
In the era of Industry 4.0, Navantia is creating a Cyber-Physical System (CPS) for enabling automatic event detection in their pipe workshops. The enhanced identification of the numerous pipes of a shipyard and their traceability, from their origin and through their life-cycle, increase productive capacity and efficiency in the processes. The CPS proposed is able to transmit signals periodically,...
A polystore system is a database management system composed of integrated heterogeneous database engines and multiple programming languages. By matching data to the storage engine best suited to its needs, complex analytics run faster and flexible storage choices helps improve data organization. BigDAWG (Big Data Working Group) is our prototype implementation of a polystore system. In this paper,...
Two different approaches of implementing Fast track analysis for attendance management system has been designed and analyzed. The first design is applying data access through card reader and the data is being saved in the memory card. All the data which are representing Student ID are processed by attendance management system for monitoring the attendance student performance. This is done via off-line...
Software Defined Networking (SDN) is a new networking paradigm which provides better decoupling between control plane and data plane. The separation not only allows OpenFlow (OF) switches in the data plane simply to forward data, but also enables the centralized programmable controller to control the behavior of entire network. SDN makes it possible to manage the network more flexible and simple....
Websites have become a form of information distributors; usage of websites has seen a significant rise in the amount of information circulated on the Internet. Some businesses have created websites that display services the business renders or information about that particular product; businesses make use of the Internet to expand business opportunities or advertise the services they render on a global...
This paper addresses the semantic gap between the domain knowledge and software application engineering by proposing a framework for mapping and integrating multiple heterogeneous data sources with application business logic by means of data semantic enrichment, aggregation, filtering and processing. Based on the main drawbacks identified in the current knowledge enhanced software application architectures,...
This paper studies the application of embedded system in water conservancy information remote monitoring, structured, modular scheme is adopted to improve the system of software and hardware design, debugging and implementation, and puts forward a set of embedded control, data acquisition and transmission, friendly interface in the integration of monitoring information management system design. This...
This article reviews and analyzes the needs of Earth observation (EO) services' users, stakeholders, and beneficiaries. It identifies the key elements of the value chain of the European EO infrastructure and builds a comprehensive knowledgebase of those elements, represented as a relational database. The entities in the database are users, needs, services, and products. The database also includes...
Nowadays, security is a part that consent by many institution including academic for example in University campus, some of campus have been implement automatic system in campus area to control visitor to enter University also for the staffs and students, but the system is in standalone with introduce new gate pass. Most of University has been use Information Technology (IT) in application for academic...
Technical debt monitoring is one of the activities that have to be performed in technical debt management. To do that, there are different techniques that can be used to estimate technical debt and different tools that implement those different techniques. This paper presents TEDMA Tool, a tool for monitoring technical debt over the software evolution and that it is open to integrate third party tools...
In this research, RESTful API as a service provider of data resource of oil palm plantation from the database using Resource-Oriented Architecture (ROA)-Slim Framework is developed. This development is able to result in a series of URI to access the data resources of the condition of the plantation environment as the support of monitoring system in oil palm plantation. Based upon the result of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.