The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The efficiency and maintainability of fault tolerance mechanisms in a computer system has typically not been a major topic of concern, mostly because fault tolerance is a non-functional system requirement. This paper proposes a Holistic Fault Tolerance architecture, based on a centralised fault tolerance management, with related functionality distributed across the entire system. The most suitable...
This work is devoted to research of possible internal threats that arise during buildings automation system working, by the example of “smart house” and propose ways to prevent them. These buildings automation systems recently have become are widespread, for example, these systems are integrating during construction new buildings and already existing. This system has many advantages, but the increase...
Software integrity and medical data secrecy in health care applications are at risk. The existing health care computing infrastructures lack the support of critical cybersecurity features, such as dynamic software integrity verifications and role-based authorization. Health-related operations are being administered and delivered to patients without proper knowledge or awareness about the integrity...
Shared memory resources are inevitable components in modern SOC architecture due to Multi-core Architectures resulting ease synchronization with enhanced speed and reliability. Again architectural verification are challenging for these protocols for coherency systems. Hence this project work has come out with complete verification environment for such a complex MESI coherency protocol based on model...
In this paper we propose a novel approach to perform codiagnosability analysis of bounded Petri nets with arbitrary labeling functions. In more detail, a set of sites observe the system evolution, each one with its own observation mask. Sites do not exchange information with each other but communicate with a coordinator. The coordinator is able to detect a fault if and only if at least one site is...
Cloud architectures have become increasing common in the IT industry and academic circle. However, most cloud architectures only focus on availability but ignore economic effectiveness. Based on Eucalyptus, this paper proposes an effective way to balance high availability and economic profits. We designed a forecast mechanism using three new modules: the forecast module, adjustment module, and collection...
Ionospheric scintillation monitoring is becoming an increasing research activity in order to devise countermeasures to the harmful effects ionospheric activity has on positioning services based on Global Navigation Satellite Systems (GNSS). The amount of amplitude fluctuations in GNSS signals due to scintillation is estimated by the �������� index. For this purpose, traditional closed loop architectures...
The trade-off between performance and power consumptionfor dynamic and complex applications is inevitable andis considered as a key design challenge for system architects. Performance statistics for hard real time systems must be readilyavailable for a feedback system, specifically for reconfigurablearchitectures. The feedback in terms of performance statisticscan be useful for run-time reconfiguration...
This paper focuses on exploitable cyber vulnerabilities in industrial control systems (ICS) and on a new approach of resiliency against them. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of cyber-attacks for ICS is impossible. Countering the impact and consequence of possible malfunctions caused by such attacks in the safety-critical...
We present our thoughts on the design of a novel hybrid system for detecting anomalous traffic in large-scale, policy-rich data networks. A key innovation in our approach is the combination of static configuration analysis and dynamic traffic analytics. More specifically, we will first develop abstractions and mathematical models to formally model the network and security configurations to statically...
Application Performance Monitoring (APM) is crucial to any enterprise to ensure that the performance of its application or service is meeting the service level agreements. There is an inherent need for the APM of traditional networks to evolve, with the advances in the internet technologies. In this paper, we present a novel approach and framework for realizing a futuristic APM for Software Defined...
Wireless sensor networks (WSNs) are essential elements of the Internet of Things ecosystem, as such, they encounter numerous IoT challenging architectural, management and application issues. These include inflexible control, manual configuration and management of sensor nodes, difficulty in an orchestration of resources, and virtualizing sensor network resources for on-demand applications and services...
In recent times there has been significant advances in managing different types of sensors and industrial devices by IoT (Internet of Things) protocol. Along with the availability of massive amount of processing power provided by the Cloud new opportunities have emerged for complete automation of industrial devices. IoT has a vast application in different sectors and domains which are yet to be explored...
Wireless Sensor Networks (WSNs) are distributed sensing ecosystems equipped with computational intelligence and radio communication capabilities. The ‘neurons’ of a typical WSN referred to as Sensor Nodes or Motes are tiny, low-cost, resource-efficient modules with embedded intelligence facilitating ultra-fast deployment, flexibility and energy-efficiency in their operations. Industrial Wireless Sensor...
AT&T is embarking on an exciting journey to revolutionize its network by transforming itself into a software company running the largest and most intelligent programmable cloud on the planet. Indeed, the network of Domain 2.0 (D2) will be intelligent software systems and applications operating on general-purpose commodity hardware [1]. This transformation will not only drive down CAPEX, OPEX and...
Sleep position is an important feature used to assess the quality and quantity of an individual's sleep. Furthermore, it is related to sleep disorders like sleep apnoea and snoring, and needs to be tracked in nursery homes to avoid pressure ulcers. Therefore, a gravity sensor attached to the chest is generally used to register body position during sleep studies. We suggest a non-intrusive and cost-efficient...
This paper introduces the Microgrid Energy Manager (MEM), a plug-and-play platform for microgrid management. MEM is an end-to-end solution for monitoring, control, and management of AC, DC, and hybrid microgrids. We introduce the application of MEM for low voltage DC microgrids. Under the umbrella of MEM, a key component is the homegrid, which is managed locally by the Homegrid Energy Manager (HEM)...
Early detection of any exceptional behavior coupled with comprehensive analysis of related data can significantly reduce performance bottlenecks and outages in any system. Collating the relevant data points and establishing correlation between them to provide an abstract view of potential hotspots has been a challenge in any large multi-tier systems. This paper describes a framework that shall enable...
While reducing costs and improving sustainability, a common goal for Smart Cities is to become more “liveable” for their citizens. By taking advantage of new information sources offered by the Internet of Things (IoT), cities can rely on sensing platforms to improve their service offer. These sensing platforms, however, raise new research challenges, in particular regarding Quality of Information...
The growth of the Internet of Things and the trends to deploy more sensors everywhere has led to search for cost effective ways to connect the devices to the Internet. In the most common network architecture for home IoT, the devices use low-power wireless or WiFi to connect to an AP and access the Internet backend. We present a study on the feasibility and efficiency of an alternate network architecture...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.