The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As demands on new software increase, new approaches are needed to help developers ensure Quality of Service (QoS) for their offered service. In this paper we present a QoS modeling approach that complements and extends the standard microservice and component-based software engineering tools by giving the software engineer information on what Non-Functional Requirements (NFRs) and quality constraints...
The article presents the results of studies of the physical security system in the infrastructure facility of a region. The following results have been obtained: structural and functional decomposition of the physical security system for the regional infrastructure has been performed; engineering solutions for the implementation of the standard functions for the subsystems of the research object have...
Household energy consumption is largely inefficient. In recent years, development in residential energy-use optimisation has attracted a great deal of attention. Given that consumers comprise a significant part of total demand, there is an incentive to assist users to manage household demand. This paper provides an introduction to Home Energy Management (HEM). An overview of available Home Energy...
The paper presents experimental research related to pH measuring and to the design of a system of pH monitoring. The paper is structured on three parts. The first part presents the principle of measuring the pH of a solution matter, the transducer structure and of the adaptor used. The second part is dedicated to the experimental research effectuated aiming at the use of PACTware software environment...
The Kansas City National Security Campus (KCNSC) collects a large amount of test data used to accept high value and high rigor product. Data has been used historically to support root cause analysis when anomalies are detected in down-stream processes (bottom portion of Fig. 1). The opportunity to use the data for predictive failure analysis however, had never been exploited (top portion of Fig. 1)...
In recent years, the use of the internet has become widespread with developing technologies. Internet is used for many needs, especially social media. Today, internet is needed for remote use of electronic devices used in homes and offices. Continuous access to the internet is very important for the quality of life of people. In this study, a proposal was made for early detection of basic faults that...
This paper outlines the effects of educational and casual software applications on young children, and defines a framework for monitoring, assessing, and improving their knowledge and skills. It shows how the use of such applications improves children skills in the main learning domains and increases their familiarity with the world. After analyzing specific abilities developed by different categories...
Internet of Thing (IoT) is going to make such a world where physical things (smart home appliances, and smart watches etc.) revolutionized the information networks and services providing systems which provide innovative and smart services to human. With smart home technology, our living area is becoming more comfortable and convenient. Smart home technology provides automated, intelligent, smart,...
Vehicle Health Management Systems (VHMS) are used throughout commercial, military, and aerospace platforms to assess the current operational status of individual assets and entire fleets. One of the most common functions within most VHMS implementations is the collection and reporting of fault conditions and trouble codes. The management of this fault data, particularly its representation to a user,...
The paper explores the features of functional modeling of the process of development of control and monitoring systems, using the example of the system of energy-saving control of technological objects.
The current state of the problem of distributed attacks aimed at denial of service is investigated, the last DDoS attacks are monitored. The most popular type of DDoS attacks continues to be httpflood. The modern methods of diagnosing DDoS-attacks are investigated. Positive and negative aspects of these methods were identified.
Assisted living and home monitoring systems are gradually becoming a necessity, considering the current trends in population ageing and older adults' desire to continue living independently in their homes and their communities for as long as possible. This paper presents our current achievements regarding the implementation of a cyber-physical system for assisted living and home monitoring, developed...
Large enterprises are moving towards Software Defined Network (SDN) adoption, where business-critical applications are being deployed on top of highly programmable network components and orchestrated by a single or multiple controllers using network protocols, such as OpenFlow or NetConf for communication. Just like in traditional networks, low-cost monitoring solutions need to be developed for SDN...
The design of new device for electromagnetic compatibility testing — environmental shielded TEM-chamber — is considered. Diagnostic algorithms and functional structure decomposition of the chamber are presented. Tasks for a monitoring service of the chamber are indicated. The possibility of the diagnostic service implementation within a real-time operating system is considered for the chamber status...
This paper describes recent developments at JIVE and the European VLBI Network (EVN), aimed at fostering the seamless interaction of VLBI networks around the globe, and eventually the inclusion of the SKA and its precursors as VLBI elements.
Technical debt monitoring is one of the activities that have to be performed in technical debt management. To do that, there are different techniques that can be used to estimate technical debt and different tools that implement those different techniques. This paper presents TEDMA Tool, a tool for monitoring technical debt over the software evolution and that it is open to integrate third party tools...
The design of today's systems on chip (SoC's) raises difficult issues, in particular regarding verification. In their early design phases, hardware/software embedded systems are commonly described as ESL (Electronic System Level) models, such that their functional and transactional behavior can be analyzed by simulation. To enhance this validation process, we have previously developed a framework...
Existing attestation solutions based on Linux Integrity Measurement Architecture treat the network as an untrusted input. Thus, they often employ strict access control mechanisms with tunneling policies to prevent network flows from tainting the system. However, these different access control policies are challenging for administrators to model and verify for different Linux deployments, making them...
Significant recent research activities and initiatives by local governments to establish resilient smart city infrastructures signal that time is right for smart cities in the near future. For example, sensors deployed within a city could monitor traffic patterns, perform environmental measurements and determine optimum traffic routing, when deployed in areas that have a power infrastructure. In this...
Technical debt (TD) refers to likely long-term costs associated with software development shortcuts taken by programmers to achieve short-term business benefits. If a development team does not manage TD, it can cause significant long-term problems such as high maintenance costs. Management strategies monitor debt items and evaluate when and if they should be paid. In order to effectively support this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.