Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Cloud Service Broker federates multiple Cloud Service Providers into a single entity to customers. The benefits that can be enjoyed by Cloud Service Consumer are flexibility, ease of use, and reduced cost. However, because of the unique properties and configurations of each cloud provider, sometime it's not easy to migrate between one cloud provider to another. Furthermore, the advantage of using...
High quality requirements are set for automated production systems (aPS) as malfunctions can harm humans or cause severe financial loss. These malfunctions can be caused by faults in the control software of the aPS or its inability to correctly identify and handle unintended situations and errors in the technical process or hardware behavior. To achieve more dependable control software, software testing...
the river discharge measurement is one of the basic projects of hygrometry; it determines the water resource utilization. However, a substantial increase in the number of hydrological site, especially for the unmanned hydrometric station brought great difficulty and caused the more workload for the Hydrologists every year. With the development of sensor technology and the data acquisition and fusion...
Due to the high cost and high power consumption problem of the present smart home server, we designed and implemented a home server based on embedded system, mainly developed by ARM11 for a hardware platform, Linux system for operating system, SQLite database and BOA server for a software platform. The home server has successfully implemented the network communication, SQLite database peration and...
Billions of transistors on a chip and the power wall made embedded systems to be designed with Multiprocessor System-on-Chip (MPSoC) architectures. One utilization of MPSoCs is the Pipelined MPSoCs (PMPSoCs). As many reliable and safety critical systems are deployed with MPSoCs, denying their service would have adverse effects. One such possibility is the insertion of a hardware Trojan that performs...
The innovative application of 5G core technologies, namely Software Defined Networking (SDN) and Network Function Virtualization (NFV), can help reduce capital and operational expenditures in industrial networks. Nevertheless, SDN expands the attack surface of the communication infrastructure, thus necessitating the introduction of additional security mechanisms. A wind park is a good example of an...
Network Functions (NFs) are deployed in networks for a variety of purposes, e.g. monitoring, security, or performance optimization. During packet processing, NF maintains the states of processed packets and/or manipulates packets based on these states. Some of these states are per-flow states while others are multi-flow states. With the emerging of network function virtualization (NFV), it is common...
Software-Defined Networks (SDN) are constantly evolving and so is their software. One of the key advantages of SDN over traditional networks is the ability to rapidly develop and deploy new features. However, updating them often requires restarting the SDN controller and causes network downtime. In addition to such planned updates, unforeseen, accidental downtime is also a risk for SDN networks. While...
China is a large agricultural country with the largest population in the world. This creates a high demand for food, which is prompting the study of high quality and high-yielding crops. China's current agricultural production is sufficient to feed the nation; however, compared with developed countries agricultural farming is still lagging behind, mainly due to the fact that the system of growing...
Internet-connected embedded systems have limited capabilities to defend themselves against remote hacking attacks. The potential effects of such attacks, however, can have a significant impact in the context of the Internet of Things, industrial control systems, smart health systems, etc. Embedded systems cannot effectively utilize existing software-based protection mechanisms due to limited processing...
The design shift proposed by OpenFlow, with its simple stateless dataplane, initially contributed to the success of Software-Defined Networks. Its lack of state, however, prevents the implementation of many dataplane algorithms. Network applications must therefore offload stateful operations to the control plane, thereby increasing latency and limiting network scalability. Thus, recent research efforts...
The growing demand for flexibility and cost reduction in the telecommunication landscape directs the focus of service development heavily to programmability and softwarization. In the domain of Network Function Virtualization (NFV), one of the goals is to replace dedicated hardware devices (such as switches, routers, firewalls) with software-based network functionalities, showing comparable performance...
Many techniques have been proposed in literature to cope with transient, permanent and malicious faults in computing systems. Among these techniques for reliability improvement and fault tolerance, Control Flow Checking allows covering any fault affecting the part of the storing elements containing the executable program, as well as all the hardware components handling the program itself and its flow...
Fifth generation mobile communication (5G) networks promise lower latency, higher traffic volume and data rates compared to what we see nowadays. Among all technologies, Network Function Virtualization (NFV) and Software Defined Networking (SDN) techniques over the cloud-enabled radio systems play an important role to enable resource pooling, scalability, layer interworking and spectral efficiency...
Justified and complete verification for hardware designs is a critical step as industrial hardware designs becomes more and more complex. Moreover, one of the most important aspects of verification is coverage which monitors during simulation which design specification, features and also RTL code area is being covered. Following how important coverage is, most hardware verification tools provide different...
Medical sensors are usually attached to or implanted inside patient body. Since medical diagnosis and treatment are a complicated procedure, multiple sensors in Body Area Networks (BAN) often need to form a group to share the measurements during the decision making procedures. To protect the confidentiality and integrity of exchanged data, group keys need to be established and distributed. In this...
Physical unclonable functions (PUFs) take advantage of the effect of process variation on hardware to obtain their unclonability. Traditional PUF design only focuses on the analog signals of circuits. An arbiter PUF, for example, generates responses by racing delay signals. Implementations of such PUFs usually employ large area and power consumption while providing very low throughput. To address...
Enforcing the computer systems security policy is highly reliant upon the use of security monitors. The monitoring system should provide a complete view of the monitored system in a stealth mode. The Serial ATA Commands Logger system described in this paper intercepts the ATA commands sent by a host bus adapter to an attached storage device, by monitoring the exchanged traffic, in a transparent manner...
The EU funded project RADIO brings forward a new health care paradigm according to which a mobile robot platform can act as assistant to an elderly person in his/her domestic environment. Under this context, unobtrusiveness is of paramount importance since the robot should be a natural participant of patients' daily life. However, robot assistance in everyday living still suffers from limited autonomy...
In this work, we propose a system-on-chip (SoC) design tool for the automatic generation of hardware sandboxes for securing untrusted IP to be integrated into trusted systems. The Component Authentication Process for Sandboxed Layouts (CAPSL) is a design flow that incorporates behavioral specifications of IP interfaces in order to generate sandboxes purposed for detecting trojan activation and isolating...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.