The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online data provide a way to monitor how users behave in social systems like social networks and online games, and understand which features turn an ordinary individual into a successful one. Here, we propose to study individual performance and success in Multiplayer Online Battle Arena (MOBA) games. Our purpose is to identify those behaviors and playing styles that are characteristic of players with...
This paper proposes a new framework for anomaly detection when collectively monitoring many complex systems. The prerequisite for condition-based monitoring in industrial applications is the capability of (1) capturing multiple operational states, (2) managing many similar but different assets, and (3) providing insights into the internal relationship of the variables. To meet these criteria, we propose...
Wireless Technology plays a significant role in current world. Many applications use wireless sensor network for health monitoring. One of the examples is the application to measure muscle response or electrical activity in response to a nerve's stimulation of the muscle. The development of wireless Electromyography (EMG) for remote monitoring of muscle activities is one of many vital parts in the...
A real-time remote data acquisition and process monitor system based on ARM and Ethernet is designed for automatic filling line. The whole scheme of the system is analyzed and the hardware and software design of the system is discussed in details. Though obtaining intuitive image video information and analyzing the real-time display data or history date which come from the production line, people...
Among the processes for making final products using fibers, the final process can be called a sewing process. The sewing process generally corresponds to the process that requires the most manpower in the production of textile products. The cost of sewing has gradually increased due to the recent rise in labor costs. The automation of the sewing process and the smart factory are expected to be carried...
The Internet of Things (IoT) for agriculture is a rapidly emerging technology where seamless connected sensors device make it possible to monitor and control crop parameters to get quality and quantity of food. This research proposes a new dynamic clustering and data gathering scheme for harnessing the IoT in agriculture. In this paper, an Unmanned Aerial Vehicle (UAV) is used to locate and assist...
Network Intrusion Detection Systems (NIDSs) play a crucial role in detecting malicious activities within the networks. Basically, an NIDS monitors network flows and compares it with the pre-defined suspicious patterns. To be effective, different intrusion detection algorithms and packet capturing methods have been implemented. With rapidly increasing network speeds, NIDSs face a challenging problem...
This paper aims to present an integrated platform to explore the role of society, culture, and behavior in energy efficiency uptake, and identify specific marketing techniques that may result in user behavior modification. We developed a consumer behavior modification framework which monitors consumer energy usage through the SDG&E Green Button API and make recommendations to the consumer. Behavior...
Phasor Measurement Unit (PMU) data provides time synchronized measurements of important electrical and power signals in AC power grids. The sheer volume of three phase electric grid PMU data, typically measured at 60 samples second, necessitates the use of automatic event (anomaly) detection for grid monitoring and control. However, this becomes an unwieldy task in cases of PMU data dropouts due to...
Due to their social influence, several areas research search and rescue field. Mobile robotics is one of them that analyzes and seeks more efficient solutions for search and rescue operations. Multirobot systems are considered to make the procedures more efficient and safe, both for the victim and for the crew. Petri nets are widely diffused for designing discrete events systems, such as networks...
In this work we report experimental tests on the performance of FTTX accesses using the mPlane measurement plane, including lab and field environments and above all we point out the role of such measurement plane in Software Defined Network architectures. For such an aim we show an experimental procedure based on a central unit (orchestrator) that automatically manages GbE links in a regional network...
The present article refers to a monitoring system applied to hybrid plants for energy distributed generation in Brazil, which contains software and hardware solutions that allow for remote data collection and storage, the monitoring of production unit performance and delivery of command to devices. This solution was developed for research purposes and the analysis of performance in microgeneration...
This demo showcases some of the capabilities foreseen for the security infrastructure designed by the H2020 SHIELD project. SHIELD exploits NFV for adaptive monitoring of an IT infrastructure and for feeding the data to an analytics engine to detect attacks in real time. An intelligent reaction system is then activated to reconfigure the SDN/NFV infrastructure so that the attacks are thwarted. The...
Flexibility and extendibility of Software Defined Networks allows development of diverse network management and flow monitoring techniques. Yet, there are inherent tradeoffs between the quality of flow monitoring and the required network resources. In particular, collecting flow statistics, at the level of specific source-destination addresses (and, moreover, specific protocols and ports), requires...
In this paper, we propose two simple and practically feasible countermeasures to address the Route Spoofing and Resource Exhaustion attacks in Software Defined Networking (SDN) scenarios. For Route Spoofing attack, we introduce a new technique called “selective blocking” which blocks an adversary node to use a genuine user's active routes, and for Resource Exhaustion attack, we propose a “periodic...
A greenhouse monitoring system using hierarchical wireless sensor network (WSN) is presented in this paper. The main parameters required to monitor and control a greenhouse are air humidity and temperature, ground moisture and environment lightness. For the data gathering of these parameters, a hierarchical WSN is presented in this work. In this configuration, the sensors, aggregated with all gathering...
We present a processing platform that implements DMR with separate clock and power sources to prevent dependent failures working with a reconfigurable cache that includes BIST with self-recovering function to detect transient faults and error prediction to prevent permanent faults. The fault tolerant processor is analyzed to be complying with the ISO26262 SOTIF for ADAS SoC which is fabricated with...
Cloud services are gaining popularity with times. Service level agreement (SLA) serves a basic understanding between the clients and cloud service providers (CSP). Ensuring secured and adequate service is a basic need of the customers. In this work a set of compliance parameters for cloud service level agreement is identified. A generic rule base is designed to empower the process with an automated...
In the future intelligent transport systems (ITS) the reliability and precision of the cooperative and autonomous vehicles are of the utmost importance. For such systems vehicle-to-vehicle and vehicle-to-infrastructure (V2X) communications is safety-critical component of ITS. Many mobility and convenience applications of ITS require the V2X bidirectional communications mode. This paper focuses on...
Urban electrical distribution networks are mostly comprised of Medium Voltage (MV) ring distribution feeders to improve reliability. Transformers connected to MV feeders transfer power from MV network to Low Voltage (LV) distribution networks. In underground LV distribution networks, feeder pillars are used to branch out LV feeders emerging from distribution transformers. Currently, the existing distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.