The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Exploding data volumes and acquisition rates, plus ever more complex research processes, place significant strain on research data management processes. It is increasingly common for data to flow through pipelines comprised of dozens of different management, organization, and analysis steps distributed across multiple institutions and storage systems. To alleviate the resulting complexity, we propose...
Software aging is a cumulative process which can lead long-running systems to failures. Software rejuvenation is the countermeasure of software aging. Rejuvenation actions usually comprise system reboot or application restart. Software aging appears as a significant concern for the reliability of software systems. Therefore, techniques and methods to analyze software aging and rejuvenation are of...
Applications integrating software with a large number of physical objects and devices in a large-scale Internet of Things (IoT) networks are on the rise. Some examples of these applications are smart grids and water networks and intelligent transportation systems. As they operate in and control a large heterogeneous environment, these applications need real-time controls, powerful and scalable data...
Conventional flow-monitoring methods, such as sFlow, cannot detect low-rate HTTP GET Flooding denial of service (DoS) attacks, which are a threat even if the traffic rate is low. To solve this problem, we propose a method for detecting DoS attacks on the basis of the burst-state duration of traffic calculated using a quick packet-matching function of a general router such as TCAM. In addition, we...
The accuracy of measurement-driven mobile coverage maps depends on the quality, density and pattern of the signal strength observations. Thus, identifying an efficient measurement data collection methodology is essential, especially when considering the cost associated with the measurement collection approaches (e.g., drive tests, crowd approaches). We propose ZipWeave, a novel measurement data collection...
The article deals with the condition estimation of 6-10 kV cable lines (CL) with impregnated paper insulation (IPI) taking into account their length and operational reliability measures according to failure statistics. The subject under study is urgent because of the lack of reasonable insulation diagnostics of CL. The article theoretically justifies the CL diagnostics with non-destructive methods...
Development problems of the intellectual software and hardware complex of the lingering pipelines-objects monitoring at a real-time mode have been considered at this article. The structure of the intellectual software and hardware monitoring complex of the lingering objects was described, including an uninterrupted monitoring subsystem, a recurrent monitoring subsystem, rules and limit states value...
This article addresses the issue of diagnostics of the complex technical systems by the example of digital substations via the analysis of the existing diagnostic methods and approaches to mathematical modeling with the subsequent realization of the digital substation hardware-software model. The question of diagnosis is relevant in view of the fact that the existing energy infrastructure in Russia,...
Aggressive scaling down of the Cu trace pitch in the redistribution layer (RDL) is needed to meet the design rule for high-density I/O used in advanced packaging. Such a downsized RDL, however, will be vulnerable to voltage and current stresses, in addition to environmental stress. Voltage stress, for example, degrades the reliability of electrical isolation (dielectric strength). This will likely...
The exponential growth of internet traffic over the last twenty years presents a real challenge to ISP looking to ensure a reliable and efficient service to their customers. Network traffic is far from being straightforward to predict and a deep understanding of the routing domains is a first requirement to achieve proper management of the traffic. This paper focuses on the monitoring and characterisation...
The Internet of Underwater Things (IoUT) is a novel class of Internet of Things (IoT), and one of the emerging technologies toward smart city. To support the concept of IoUT, Underwater Wireless Sensor Networks (UWSNs) have emerged as a promising system. In this paper, we survey the potential IoUT applications, point out the challenges and differences between UWSNs and traditional sensor networks,...
It is difficult to address the problem of occlusion and loss of target when a single image tracking algorithm is utilized in high reliability occasions, such as prison, coal mines and military area. This paper presents a novel tracking and monitoring system based on wireless location and video. A coordinate frame of wireless system of scene constructed by binding the targets with RSSI labels is used...
This demo presents a SFC orchestrator that provides intelligent, dynamic and automated VNFs and network deployment over heterogeneous NFV and SDN enabled Cloud environments. The proposed architecture is based on the ETSI NFV reference architecture and TOSCA standards. In this demo, reliable VNF placement and chaining is ensured using the algorithm proposed in [1] “A Link Failure Recovery Algorithm...
A method and a circuitry for the periodic monitoring of the Bias-Temperature Instability (BTI) influence on SRAMs are presented in this paper. Periodic BTI monitoring provides the ability to predict failures in the memory operation, due to aging, and early react to avoid them. The proposed scheme is based on a simple, low silicon area overhead, differential ring oscillator that can be easily embedded...
Modern mining approaches should be able to properly deal with the increased availability of structured data. Here we focus on the problem of processing streams of trees. Specifically, we cope with classification tasks. We show that by adopting a double concept drifting reaction mechanism in the context of a kernel-based ensemble of classifiers, it is actually possible to have an effective and efficient...
One of the main challenges in mechatronics is to manage large amount of information data. This information is used to control the process, manage critical errors or perform maintenance actions. The traditional communication buses are wired buses which have great reliability. But with the revolution of industry 4.0, industry and mechatronic systems increased sensor and data acquisition nodes, from...
We demonstrated fully automated in-line atomic force microscopy (AFM) for local height variation monitoring solution. Two use cases, which are local variation of SADP Fin height and oxide recess height in Fin reveal process and that of Cu nail protrusion and Cu pad recess height in wafer-to-wafer hybrid bonding process were evaluated in order to evaluate in-line AFM capability as a metrology solution...
In the near future Smart Grid will be able to monitor and control key elements in the generation, transmission and distribution of energy to the end-user. This concept is in full development, but it will take a lot of time to achieve "maturity". Activities like consumer education, development of standards, technology improvement need to be carried out so that the concept of Smart Grid takes...
General aspects regarding software quality are discussed. Bayesian networks mathematical model is proposed to evaluate the software quality, from the reliability point of view. This model was previously used to evaluate a substation monitoring software system developed in Romania as case study. Currently, we extend it to evaluate the reliability of a software system for EMS (Energy Management Systems)...
The pollutant emission from vehicle exhaust has become one of the main sources of urban air pollution. Through the analysis of the diffusion of vehicle exhaust pollutants in the limited area, combined with traffic pollution sources are line source pollution characteristics, the hourly average of vehicle pollutant concentration is obtained by using the remote sensing equipment on both sides of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.