The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Marine operations face the major challenge of increased complexity. Much more data are being collected for diagnostic and monitoring purposes with sensors on board a vessel. However, due to the lack of easy data presentation and interaction, the crew members are overwhelmed by the large volume of information and alert messages, causing serious information overload problems. In this paper, we explore...
Heartbeat monitoring during sleep is critically important to ensuring the well-being of many people, ranging from patients to elderly. Technologies that support heartbeat monitoring should be unobtrusive, and thus solutions that are accurate and can be easily applied to existing beds is an important need that has been unfulfilled. We tackle the challenge of accurate, low-cost and easy to deploy heartbeat...
In smart cities, providing structural health care for multi-storey buildings and bridges are major challenges. Corrosion is the major cause of structural failures in civil infrastructures. Continuous monitoring is essential for timely actions like strengthening of reinforced concrete, repainting the structures using special paints to avoid further corrosion and for performing repairing works. The...
Plantar Fasciitis is a common condition involving inflammation of the plantar fascia, causing heel pain and reduced mobility. Typical treatment methods for plantar fasciitis include medications (NSAIDs), exercises, physical therapy, and surgery. Mobile Health (mHealth) technologies stand to improve care for plantar fasciitis via daily monitoring and by addressing barriers to patient adherence with...
To maintain acceptable levels of security, organizations must manage their IT assets and related vulnerabilities. However, this can be a considerable burden because their resources are often limited. This paper introduces a technique and system architecture that monitor the vulnerability of the IT assets on an organization's administrative networks. We use open information and standardized, non-proprietary...
This report describes a small heartbeat monitoring system using capacitively coupled ECG sensors. Capacitively coupled sensors using an insulated electrode have been proposed to obtain ECG signals without pasting electrodes directly onto the skin. Although the sensors have better usability than conventional ECG sensors, it is difficult to remove noise contamination. Power-line noise can be a severe...
The recent rise in the availability of sensors to monitor our day-to-day lifestyles calls for techniques to glean information out of the generated data. For many of these sensors, the data recorded is periodic in nature. Moreover, it has been shown that a change in this periodic data is correlated to a shift in physical or mental health. We present a technique to compare this repetitive data, both...
This paper is conceptualized to generate electricity as an alternative due to increasing oil prices and as a possible solution to the energy crisis in the incoming years. Even though, unpopular type of renewable energy, wave energy is seen as a potential source that could be used to generate the amount of power. Electricity can be generated by the mechanical force collected from the movement of waves...
We present the design and user study based evaluation of a personal health dashboard aimed to supported reflective behavior change. Rather than providing direct actionable instructions, we target to present health data in such a way that the users infer their health status and create their own actions from the data itself. User interviews revealed a wide range of potential challenges with the adoption...
The proponents introduced the development of a power surge monitoring and suppression system with the use of NI LabVIEW. It is designed to capture waveforms and data of an occurring power surge from electrical wirings. The system is intended for household use to protect household appliances. Upon creation of the system, errors and difficulty have brought about problems. The problem acquired is the...
This paper describes the co-simulation methodology adopted for hardware verification of a next generation network packet processing engine (Advanced I/O Processor or AIOP) utilizing virtual prototype models developed originally for software verification. Though co-simulation strategies are common in verification of stand-alone processors, they have seldom been used for mega-modules and SoC, which...
Network management is a major issue in information world which requires high effective implementation to have properly structured information system for providing accurate data across a wide area. Efficiently functioning systems and management in a network, is necessity of up growing information sector. This needs a proper network for providing precise and accessible services to the clients over a...
Increased dependency of the human society on the Electrical Energy, demands extra provision for sophisticated monitoring and control. The Monitoring of the Electrical System involves observing whether all the electrical parameters like voltage, power, current are within the scheduled limits or not and the Controlling of the Electrical System involves the necessary actions that are to be taken if the...
JavaScript libraries, such as JQuery, are widely used in web applications. In these libraries' event delegation models, a DOM element's event handler is usually bound to its parent nodes. This makes it difficult for developers to figure out the user-defined event handlers of a specified DOM element. In this paper, we propose an approach that identifies the user-defined event handlers of DOM elements...
Physicians currently have no objective information about the intensity and quality of a Stroke patient's daily-life activities after returning home from the rehabilitation hospital. Therefore there is a need to unobtrusively monitor patients performing daily life tasks at home. Within the INTERACTION project, a new inertial based sensor suit was developed, which is able to measure Stroke patients...
Kernel-level Rootkit injects malicious code in the system kernel and realizes vicious function by modifying kernel code and data. The emergence of virtualization technology makes Rootkit hide itself and accesses system resources effectively. This paper proposes a kind of Rootkit based on VMM (VMRootkit) which can hide system process and system cannot find it. For realizing it, we firstly puts forward...
Lifetime of wireless sensor nodes is a big challenge in bridge structural monitoring as these nodes may be deployed inside the bridges. In this situation, it is infeasible to replace batteries or harvest solar and wind energy. To prolong lifetime, vibration energy begins to be utilized to replenish energy for sensor nodes. In this study, a vibration energy harvester based on Micro Fiber Composite...
Sensors capable of operating in harsh environments for long periods of time and having wireless readout capability are needed for mapping environmental conditions in remote areas, such as polar regions. In this paper, we report the first measured results of an innovative in-situ system of controllable and wind-opportunistic spherical mobile sensors (called Moballs), used to monitor and map various...
Monitoring and encryption are essential to secure today's computer networks. Monitoring network traffic data can be especially useful to protect against data exfiltration by detecting signatures in file metadata to identify especially sensitive files that should not be publicly released. Encryption restricts the visibility of signatures, but this may be needed because some signatures used to protect...
In batch systems monitoring information at the level of individual jobs is crucial to optimize resource utilization and prevent misusage. However, especially the usage of network resources is difficult to track. In order to understand usage patterns in modern computing clusters, a more detailed monitoring than existent solutions is required. A monitoring on job level leads to dynamic graphs of processes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.