The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In smart grids, the deviation of frequency and phase angle serves as an important indicator of abnormal events, the detection of which is critical to maintain reliable and stable operations of the power grid. However, the high cost and low accessibility of current power grid monitoring systems restrict their large-scale deployment over highly distributed microgrids. In this paper, we present a practical...
A fire-fighting control system, which is usually implemented through programmable logic controllers, is a typical type of safety-critical cycle physical system. It has been widely used in currently complex industrial applications. So it is significant for a fire-fighting control system to conduct safety checking. There have been many methods to check safety of a fire-fighting control system so far,...
Cloud computing is a groundbreaking solution to acquire computational resources on demand. To deliver high quality cloud services and provide features such as reduced costs and availability to customers, a cloud, like any other computational system, needs to be properly managed in accordance with its characteristics (e.g., scalability, elasticity, timeliness). In this scenario, cloud monitoring is...
Electricity companies will only allow customers to inject power into the grid network if the customer's system is in synch with both frequency and phase as the grid itself. This is normally achieved using a specialised machine sold by the energy provider. It may be possible to achieve this via low cost, low power nodes such as a Raspberry Pi, to synchronize frequency and phase as well as voltage and...
Wireless sensor networks (WSN) face different security threats that disrupt the normal activities and degrade the performance of the networks. The wormhole attack is one of the most severe security attacks in WSN. In this paper, we analyze the effect of the wormhole attack in Optimized Link State routing (OLSR), which is a standard proactive routing protocol for WSN. A modified version of wormhole...
The complete integration of the Synchronized Measurement Technology (SMT) in the power systems will bring about fundamental changes to the applications of the control center. One of the natural applications of the SMT is the state estimation. Although the state estimator is used for monitoring the steady state operating condition, it is envisioned that in the near future, a PMU-based state estimator...
The paper addresses an attempt to perform dynamic timing simulations of complex mixed signal IP's. The targeted IP is a memory and uses its behavioural model; the idea spans from checking the presence of IO Path delays and timing checks viz. setup, hold, recovery, removal, width etc, and validating the impact on the IP behaviour. The methodology is developed and validated on UVM semantics; the eco-system...
Hardware IP design verification is performed using exhaustive random stimuli, while incorporating a coverage driven flow. On the other hand, system-on-chip (SoC) verification methodologies, sometimes, use a directed C-based verification approach to validate the functionality of the design. There is no significant randomization exercised in this process. Reuse of IP testbench components for SoC verification...
We are concerned with reliably harvesting data used to monitor a service-based system hosted in a mobile ad hoc network (MANET) environment. These data are time-bounded, time-sensitive time-series data recorded by individual hosts in the network. Harvesting is used to gather the data for global time-series analyses, such as fault localization. The MANET environment challenges data harvesting, due...
This paper describes a distributed sensor platform for a new breed of artificial pancreas devices. In recent work, a multi-variable adaptive algorithm has been proposed which incorporates physical activity of the patients for accurate prediction and control of glucose levels. In order to facilitate this algorithm, we integrate a smartphone and multiple sensors including activity trackers and a glucose...
This paper shortly describes creating asynchronous methods by delegates, the locking techniques and locking a shared resource by an instance method using the Monitor. Enter and Monitor. Exit member methods of the Monitor class. The paper demonstrates the use of asynchronous methods and locking shared resources in the distributed .NET application which consists of the Windows Communication Foundation...
Verification of Gigabit Ethernet MAC (Media Access Control) by using the most advanced verification methodology i.e. UVM (Universal Verification Methodology) has been presented in this paper. The main function of MAC is to forward Ethernet frames to PHY through XGMII (10 Gigabit Media Independent Interface) and to receive the frames from PHY to MAC through the same interface. Verification of IP provides...
To control and preventing volcanic risk, are used different devices where many parameters are monitored that provide insight into the state of a volcano. This paper presents the design of system for monitoring the volcano seismicity. This system is composed of the module of acquisition data, the power module, the peripherals for communicate remotely and GPS to get time synchronization. This system...
Carrying out network monitoring tasks remains a continuous challenge, partially because the line rate reaches and exceeds 100 Gbit/s. Besides the increasing data rate, the advent of programmable networks necessitates efficient solutions for supporting packet processing tasks in an adaptive way. Introducing a modification of a protocol or any new protocol in such a flexible infrastructure implies a...
A Dynamic Software Product Line (DSPL) is a widely used approach to handle variability at runtime, e.g., By activating or deactivating features to adapt the running configuration. With the emergence of highly configurable and evolvable systems, DSPLs have to cope with the evolution of their structural variability, i.e., The Feature Model (FM) used to derive the configuration. So far, little is known...
In the present study, we investigated whether EEG indices derived from passive brain-computer interfaces can be used to track emotional arousal changes during continuous EEG recording. Global synchronization index (GFS), a measure known to reflect human cognitive process, was evaluated to quantify the global synchronization of multichannel EEG data recorded from a group of participants while they...
Embedded and real-time systems must balance between many often conflicting goals including predictability, high utilization, efficiency, reliability, and SWaP (size, weight, and power). Reliability is particularly difficult to achieve without significantly impacting the other factors. Though reliability solutions exist for application-level, they are invalidated by system-level faults that are particularly...
This paper proposes a new tool for non-autonomous hierarchical systems modelling. These hierarchical structures analyse recurrent actions disposed on hierarchical levels. The proposal improves previous proposals of authors dedicated to monitored distributed hierarchical systems modelling. The Recurrent Synchronized Fuzzy Petri Nets tool (RECSinFPN) usually describes a hierarchical structure composed...
Trace-driven simulation of chip multiprocessor (CMP) systems offers many advantages over execution-driven simulation, such as reducing simulation time and complexity, and allowing portability, and scalability. However, trace-based simulation approaches have encountered difficulty capturing and accurately replaying multi-threaded traces due to the inherent non-determinism in the execution of multi-threaded...
Interoperability between shop floor devices and upper layer systems is a key challenge for enabling Internet of Things in industrial applications. Standardized protocols such as IPv6, CoAP, and XML can be used to address this issue. Widely used XML-based technologies such as SenML, EEML, OPC-UA as well as others rely on XML to be able to support a wide range of sensor and actuator applications. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.