The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
First of all, this paper briefly introduces the current management and use of telemetry data, remote control information, satellite test environment data, space environment data after orbit and so on, which most are produced by satellite test and on-orbit management. Then the software platform for application of the satellite data accessing and monitoring based on the distributed large data management...
Online education is evolving at a fast pace thanks to novel technology-mediated learning environments: Massive Open Online Courses (MOOCs), gamified learning, intelligent tutoring systems, citizen-science communities, informal learning groups are blossoming everywhere as novel opportunities for teachers and learners. However, the educational effectiveness of these solutions has to be proved and technological...
An increase of vehicles in a city without an efficient infrastructure of traffic management can cause damages not only financial but also environmental and social. In order to support urban traffic system to relieve the traffic congestion and the damage caused by congestion of vehicles, in this paper, we propose a mechanism for Intelligent Transport Systems named FOg RoutE VEhiculaR (FOREVER), in...
Cloud computing has expanded rapidly as a promising technology in the recent years and has drastically altered the majority of opinions about computing mode and application deployment. While the cloud has been proved to improve efficiency and earn benefit for a great number of various services providers, yet a good few enterprises still hesitate to move to the cloud because of security threats. In...
Due to rapid changes in customer requirements, production systems constantly need to evolve. Together with the increasing penetration of internet, this everlasting evolution process is one of the main drivers to implement Cyber-Physical Production System (CPPS). Therefore, this paper proposes to enhance evolution support besides the raw implementation of changes on the cyber level of CPPSs. Enhancements...
Cloud Radio Access Network (C-RAN) is emerging as a transformative architecture for the next generation of mobile cellular networks. In C-RAN, the Baseband Unit (BBU) is decoupled from the Base Station (BS) and consolidated in a centralized processing center. While the potential benefits of C-RAN have been studied extensively from the theoretical perspective, there are only a few works that address...
Energy interconnection (EI) is a logical consequence when ideas of open source and distributed scheme from the information field are introduced into the energy field. EI is essentially a typical cyber-physical system. This paper studies the new capabilities in sensing, computation, communication and control by analyzing its characteristics and demand. Firstly, we analyze the system architecture of...
With the rapid development of the UHV power grid, the data interaction between the dispatching agencies has increased significantly, and the inter-agency integration features have become increasingly obvious. However, at present, the service bus in the dispatching control system is mainly for a single scheduling mechanism, only to achieve wide area sharing of specific application services and not...
The telecom infrastructure is undergoing a huge transformation since operators are deploying their own cloud infrastructure to provide cloud services and enabling Network Functions Virtualization (NFV). The resulting infrastructure is referred to as the telecom cloud. NFV decouples network functions from proprietary hardware appliances, so they can be implemented in software and deployed on virtual...
The maturity and flexibility of Software Defined Networking principles, favouring centralized control deployments, featured application programming interfaces and the development of a related application ecosystem, has paved the way for the design and implementation of advanced and adapted control plane architectures that specially target and enable efficient and massive monitoring and data collection...
Elasticity plays a key role in developing applications to run in cloud environments. However, to implement elasticity directly in the application code is a hard task. Besides, current elasticity strategies usually focus on IaaS resources without taking into account what is running on VMs (Virtual Machines), leading to issues such as inaccurate elasticity and resource over-provisioning. This paper...
Research in 5G architectures is focused on exploring ways to leverage the use of virtualisation offered by cloud infrastructures and network programmability to provide flexibility and agility in the development and deployment of Network Services and virtual network functions. In this context, this paper presents the description of SONATA project demonstrator. SONATA supports agile development and...
Software-Defined Networks (SDN) are constantly evolving and so is their software. One of the key advantages of SDN over traditional networks is the ability to rapidly develop and deploy new features. However, updating them often requires restarting the SDN controller and causes network downtime. In addition to such planned updates, unforeseen, accidental downtime is also a risk for SDN networks. While...
This paper defined a unified architecture of IoT system, on which IoT node model, virtual things, the basic service of things and overall hierarchical model of services had been described. IoT nodes must be connected directly to Internet and provide basic services of things in this architecture, and started from the base services which were compatible with Internet applications system of SOA, built...
Scientific workflows have become a popular computational model in a variety of application domains, such as astronomy, material science, physics, and biology. As scientific applications are moving to the cloud to take advantage of the elasticity and service level agreement of resources, there has been a number of recent research efforts on cloud-based workflow systems that support various types of...
With the increasing deployments of Network Functions Virtualization (NFV) in both industry and academia, it becomes necessary to design mechanisms for keeping the integrity of Service Function Chains (SFC) responsible for NFV services delivering. Despite the advances in the development of management and orchestration for NFV, solutions to keep SFCs resilient to well-known and zero-day threats are...
SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity framework, which offers security-as-a-Service in an evolved telco environment. The SHIELD framework leverages NFV (Network Functions Virtualization) and SDN (Software-Defined Networking) for virtualization and dynamic placement of virtualised security appliances in the network (virtual Network Security...
With the demand of power information construction and the application of D5000 platform, the standardization and management of all kinds of data becomes a necessary condition for data sharing and application integration between systems. In order to realize the safe, convenient and efficient information resource sharing of power enterprises and improve the information management level, the fusion method...
The Internet Of Things (IoT) is poised to make substantial inroads in all aspects of modern life before the end of this decade, including applications in smart grids, smart cities, transportation, crowdsensing, e-health, ambient assisted living, and home automation, to list just a few. Although it is recognized that IoTSec mechanisms and principles are needed across the entire IoT ecosystem, many...
The state of art secure digital computing systems heavily rely on secure hardware as the Trusted Computing Base to build upon the chain of trust for trusted computing. Attack Protection Blocks are added to the hardware to prevent an adversary from bypassing the security provided by hardware using various side channel, voltage, frequency, temperature, and other attacks. However, attackers can target...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.