The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper researches and analyzes the current situation of the application of mobile medical services in chronic disease monitoring and management. With chronic diseases and mobile medical development trend in China, we propose a monitoring and management system for the physical sign of elderly patients with chronic diseases. By using the system, patient can monitor and upload the physical sign data,...
Continuous evolution of virtualization-related technologies have benefit greatly flexibility and reliability of software system. However, although virtualization removes binding between application and server underneath, it complicates the regular runtime hierarchy into an intricate structure, where cross-layer monitoring and holistic evaluation becomes challenging. Currently lots of monitoring practices...
With the continuous progress of rural construction, the problem of rural drinking water pollution is increasingly prominent. In view of water pollution, a design of rural drinking water monitoring system based on wireless sensor networks is proposed that nodes take STM32 as the core chip and WLK01L39 as well as its peripheral circuits are used as wireless communication modules and Beidou S1216 is...
Much of smart phone time is spent in using apps that connect to the Internet. Android, out of the box, does not provide network filtering or monitoring facilities. Security exploits and privacy leaks makes it necessary that we track network usage that could be happening behind our backs. We have built a “network ombudsman” framework service and an app that continuously monitors and logs the network...
The operation and maintenance of large distributed systems that are subject to high QoS conditions has led to the need of designing and developing advanced monitoring tools that facilitate the administration of the critical services required by the user communities. RASSMon is a portable, reliable, secure software platform able to collect monitoring data from multiple sources in heterogeneous environments...
This article selects load balancing system technology to analyze, combines the live migration technology of virtual machine, and studys the frame of virtual machine live migration as well as the mathematical model applied to concrete process of the migration. The article presents that the process of combining the specific strategies of load balance to the frame of live migration, that the simulation...
In this modern era of the digital world, the patient's medical records are electronically maintained and updated for the maintenance of the good health. The electronically stored patients' health status is termed as the Electronic Patient Record (EPR). The EPR service includes the accessing, storage, and maintenance by the authenticated users. However, in the emergency situation, the EPR can be required...
The school shuttle system commonly uses the vehicle to facilitate students to go and go home from school. However, there needs to be a development in terms of monitoring the students. In this paper explains the development of school shuttle system with IoT concept to apply Smart School application. The system will be designed uses a reader that will identify the identity card of students using Bluetooth...
Current manually-operated SOS systems used in Rallying are ineffective when driver and co-driver cannot push the SOS button due to loss of consciousness after the impact. The SafeRally service proposes a low-cost pilot monitoring system, to associate with existing tracking systems, able to automatically notify a serious accident, when both the driver and the co-driver cannot request help by themselves...
In this paper a system for increasing children's safety is proposed. The focus is on the daily route from home to school and vice versa, assuming the use of school buses. IoT paradigm is exploited together with different localization techniques i.e. RFID and GPS, in order to design a solution for parents willing to make certain of their child's following the main steps to school or home, i.e. taking...
Traffic light congestion normally occurs in urban areas where the number of vehicles is too many on the road. This problem drives the need for innovation and provide efficient solutions regardless this problem. Smart system that will monitor the congestion level at the traffic light will be a new option to replace the old system which is not practical anymore. Implementing internet of thinking (IoT)...
State Islamic University of Syarif Hidayatullah Jakarta as rapid growing university towards world-class university placed in The edge of Jakarta has a data center runs by its unit of organization called Pustipanda (The Center of Information Technology and Database). The team had made observations during the last one year and found that these data center lately had an incident occurred where its hardware...
Through the continuous collection and in-depth analysis of the quality monitoring data of colleges and universities, we combine the efficiency processing of big data and data evaluation, monitor the status of higher education normally, and construct a higher education quality monitoring and evaluation platform based on Spark. This platform is teaching centered with schools as its basis, including...
Wireless sensor networks (WSNs) are strongly useful to monitor physical and environmental conditions to provide realtime information for improving environment quality. However, deploying a WSN in a physical environment faces several critical challenges such as high energy consumption, and data loss.In this work, we have proposed a reliable and efficient environmental monitoring system in ponds using...
Although academic and industry experts are now advocating for going from large-centralized Cloud Computing infrastructures to smaller ones massively distributed at the edge of the network, management systems to operate and use such infrastructures are still missing. In this paper, we focus on the monitoring service which is a key element to any management system in charge of operating a distributed...
Together with the rapid development of IT technology, cloud computing has been considered as the next generation's computing infrastructure. One of the essential components of cloud computing is the virtual machine technology that enables to reduce the data center cost with better resource utilization. Especially, VDI (Virtual Desktop Infrastructure) is receiving explosive attentions from IT markets...
The increase in population, has led to tremendous degradation in the state of affairs of hygiene with respect to waste management system. The spillover of waste in civic areas generates the polluted condition in the neighboring areas. It may aggravate numerous severe diseases for the nearby people. This will humiliate the appraisal of the affected area. For eliminating or mitigating the garbage's...
With the rapid development of WEB applications, the demand for dynamically adjusting computing resources based on the load variation is increasing. However, most of the traditional WEB systems have limited ability to respond to load changes. In order to solve the problem, software self-adaptation technology has been applied to the resource management of WEB systems. Many researchers have tried to...
The proposed model of a multi-agent environment for e-learning due to increase in the cybercrime was found to be susceptible to DOS attacks and personification attacks that is dealt by embedding the mitigation mechanism of IP filtering with the proposed model. Developing the e-learning environment in which an algorithm has been implemented to filter the spoofed IPs from the legitimate IPs. The multi-agent...
In this paper we study the problem of estimating the cardinality of pairwise set operations (union and intersection) over sets possessed by different data owners, while preserving differential privacy. In our problem setting, a data owner could only communicate with an untrusted server, and thus have to perturb its set data for privacy protection before sharing them with the server. This problem setting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.