The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Threats within the network are a security risk with which you deal daily. Due to this, the use of more complex means of security than the Firewall should be considered to perform the analysis of the traffic behavior of the network by means of devices of next generation such as Systems of Detection and Prevention of Intrusions (IDPS). This article presents a comparison of commercial systems and open...
This work deals with modern trends in the design and development of monitoring and data acquisition systems for potentially explosive gases in underground sites, as well as implementing this kind of a system, with dedicated software, in mine openings made by Hidroconstructia Company in Buzau County.
This paper presents the use of a new concept: Internet of Things (IoT), applied to the fermentation process of Cocoa at the Piura's mountain range. A prototype was designed and built with sensors that record the variables of temperature, oxygen and carbon dioxide during the process and send this information to the Internet. Finally a system has been developed that receives this information, visualizes...
As saving the energy inside a house is an important issue to address, more home appliances are now implementing IoT technology. Here, we propose an IoT based smart home software application that are able to intelligently control the home appliances automatically based on our instruction set or behavior. The smart home uses the software to receive input from the user and forward the input to the server...
This paper develops a supervisory control and data acquisition (SCADA) system to monitor an islanded DC microgrid including wind turbine, photovoltaics, and battery units. The SCADA system is based on KingView 6.55, and establishes data communication between the host and the slave computers through intelligent modules and different communication techniques. The developed SCADA system can monitor real-time...
It is essential for a constructivist teacher to monitor the apprenticeship of each student in order to facilitate the definition of the next steps in the development of a discipline. Since monitor the apprenticeship is a very complex and time-consuming task, a theoretical framework that supports the observations of the teacher becomes necessary. The use of concept maps to record a students understanding...
Fraud prevention in the banking sphere is a very important type of activity which can cover a whole range of fraud schemes — both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of the system of monitoring and analysis of threats...
Active learning has demonstrated value in STEM education and various meta analyses show improvements in student performance when making use of active learning pedagogy and active learning classrooms. One limiting factor to extending the reach of active learning is cost. Many models for state-of-the-art active learning environments make use of tools and infrastructure through which students can connect...
Internet of Things (IoT) proved to have the potential to transform the industrial and consumer's environment. Radio Frequency Identification (RFID) technology, as a primary stage of IoT, has been successfully integrated in the continuous deployment tracking-aiming solutions included into pervasive networks. Three software applications dealing with RFID-based applications for real-time localization...
Project monitoring poses a relevant role for project success and it is considered more fundamental in a distributed environment since it confronts additional risks such as culture, geographical, and temporal barriers. Recognizing the complexity and importance of a distributed project, it is vital that undergraduate students receive practical experience and are trained to face the obstacles this form...
Our research work aims to develop a monitoring and control system in potentially explosive environments using microcontrollers. The paper presents a micro-system designed and achieved within the Metrology Laboratory of S.C. SIP S.A. It describes the user interface software structure built and used with the acquisition and transfer modules as well as managing the signals received in a SQL SERVER 2008...
Some approaches and techniques that allow conducting of complex physiological research using closed-architecture measurement systems of different manufacturers are discussed. The experience in developing a system with flexible configuration and in solving arising problems by virtue of integration of equipment using an external synchronizing device, is described. Parallels are drawn with the modern...
The river pollution has become a prominently environmental problem to human survival. Thus it is in urgent demand for real-time monitoring of river water. However, traditional methods have some disadvantages such as complicated instrument, high cost and cumbersome operation. Herein, we developed wireless conductivity sensor, which forms a monitoring network system based on ZigBee. The node of the...
This paper presents a design approach to an embedded monitoring system found in distributed renewable energy power systems. The grid connected distributed power system, delivers energy to the consumers located on the micro-grid, operating at distribution voltage levels, and also delivering the remaining surplus energy to the main distribution grid. The aim of this paper is to present the development...
In the paper, principles of constructing systems and functional abilities of information support of human-operators (IOSS) of power units of nuclear power plants (NPP) and their place within the system of upper unit-level of automated process control systems (APCS) of NPP. The purpose of implementation of the NPP IOSS is preventing or decreasing the frequency and heaviness of operator errors appearing...
Scientific research is data-centric, relying on the acquisition, management, movement, analysis, and sharing of data. Proficiently managing the end-to-end lifecycle of scientific data is non-trivial and comprises many time consuming and mundane tasks. While individual tasks are not prohibitive, when done repeatedly and frequently they represent a significant strain on researchers. We posit that a...
Science is conducted collaboratively, often requiring knowledge sharing about computational experiments. When experiments include only datasets, they can be shared using Uniform Resource Identifiers (URIs) or Digital Object Identifiers (DOIs). An experiment, however, seldom includes only datasets, but more often includes software, its past execution, provenance, and associated documentation. The Research...
The issues of developing an intelligent software and hardware monitoring system for lingering objects (oil product pipelines in real time mode) are considered. The possibility of using the industrial safety management system during operation of an intelligent software and hardware monitoring system for lingering objects is introduced. In the process of management, an information model of industrial...
Buildings represent 40% of total primary energy use in the U.S., and researchers have recognized the necessity of making office spaces more energy efficient. To reduce energy consumption, it is important to take into account buildings occupants' behavior into account. The difference between simulated, estimated and real power consumption in buildings reflects the need to search for more accurate ways...
Software specifications are useful for software validation, model checking, runtime verification, debugging, monitoring, etc. In context of safety-critical real-time systems, temporal properties play an important role. However, temporal properties are rarely present due to the complexity and evolutionary nature of software systems. We propose Timed Regular Expression Mining (TREM) a hosted tool for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.