The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to develop the bottom driver software more rapidly and efficiently which are used in automotive battery management system and to get rid of high dependence on the hardware and low reusability of the drivers in automobile controller, this paper puts forward a kind of driver design method based on automotive open system architecture (AUTOSAR). Simulation modeling module has been made with the...
In addition to in-house applications, networked enterprises are increasingly using data and services from various external sources. Conversion of data to useful information and IT alignment with business goals are big challenges faced by these enterprises. Integration platforms (IPs) aid enterprises in solving such challenges. However, the large number of commercial and academic IPs currently available...
The use of an Application Lifecycle Management (ALM) system to promote cross-discipline data capture, tracking and traceability has shown to provide a dramatic improvement during airworthiness audits of software-centric avionics systems by reducing both the time to locate relevant information and rework associated with errors in captured data and their traceability. When configured correctly, an ALM...
The development of a network centered life has increased overall data rates in core networks. Thus, data centers face the challenge to provide always more services at higher data rates while reacting quickly to complex failures and more powerful attacks thanks to efficient network forensics. Moreover, Software-Defined Networking (SDN) becomes a standard which offers agility but also requires forensic...
Web service is a popular solution to integrate components when building a software system, or to allow communication between a system and third-party users, providing a flexible and reusable mechanism to access its functionalities. Various web service based systems are prevailing in health service provision. We propose a framework of construction, searching and protection of typed health resources...
Recently, a micro-service architecture has been adopted to an edge device in smart factory due to its maintainability and scalability. In the architecture, all services are generally implemented as Docker containers and deployed by Docker APIs which might be harsh to a factory operator. In this paper, we propose an easy-to-use web-based service deployment method for containerized service to in-factory...
Remote Laboratories are used in educational settings as tools to give students access to experiments that are not physically available to them at their institutions. During implementation, problems such as: bandwidth, security or limitations in terms of the usability, have been identified. This paper proposes an approach that integrates, what we call, a Smart Adaptive Remote Laboratory (SARL) with...
Conventional cyber defenses require continual maintenance: virus, firmware, and software updates; costly functional impact tests; and dedicated staff within a security operations center. The conventional defenses require access to external sources for the latest updates. The whitelisted system, however, is ideally a system that can sustain itself freed from external inputs. Cyber-Physical Systems...
Real-time lossless compression can reduce the burden of big data transmission and storage. Hardware compression is faster and more energy saving when compared with software. This paper proposes a novel LZO hardware architecture and various acceleration methods, integrates the compressor module and other IP modules. Finally, test and demonstration are provided on the DE2 development board. The results...
This work presents the major characteristics and lessons learned by the development and prototype implementation of an event-oriented and cloud-based SCADA system that is constructed using a microservice architecture. The microservices are then utilized to propose an approach for implementing product-driven production systems under the RAMI4.0 specification.
The purpose of the following study is present the MOOC Information System Generic Architecture as a result of the analysis of quality characteristics found in the literature concerning of MOOC, and the application of the Discovering Hybrid ARchitectures by Modelling Actors (DHARMA) method based on the use of i∗. Generic Architecture refers to the identification of MOOC system actors, the services...
Software Defined Networks (SDN) has been attracting various researchers from both academia and industry to enhance the current ICT stakes and networking paradigm. The beauty of SDN is the division of Control and Data planes and make it easy for the engineers to modify the networking protocols without visiting onsite devices. Similarly, Smart Cities concept has been coined recently, where a plethora...
Virtual Content Delivery Network (vCDN) orchestration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV orchestration algorithm due to the evident huge amount of traffic to be delivered to end customers of the network...
The growing connectivity of the systems that we rely on e.g. transportation vehicles is pushing towards the introduction of new standards aimed at providing a baseline to address cybersecurity besides safety. If the interplay of the two normative spaces is not mastered, compliance management might become more time consuming and costly, preventing engineers from dedicating their energies to system...
The IEEE 1516-2010 — Standard for Modeling and Simulation High Level Architecture (HLA) range of standards are widely used for distributed simulation, interoperability, reusability and the modeling of large-scale systems in many application domains. Although it provides several advantages, the development of distributed simulations based on the HLA standards remains a challenging task that requires...
Honeynet is deployed to trap attackers and learn their behavior patterns and motivations. Conventional honeynet is implemented by dedicated hardware and software. It suffers from inflexibility, high CAPEX and OPEX. There have been several virtualized honeynet architectures to solve those problems. But they lack a standard operating environment and common architecture for dynamic scheduling and adaptive...
The general system properties of distributed computer systems realized in the global computing environment are analyzed. The reasons for the reproduction of heterogeneity in it and its vulnerability to unauthorized exposure of executable programs are revealed. The principles of the formation in it of the universally programmable and cybersecurity algorithmic space for distributed computing by network...
On the financial side, a key factor for the success of a smart-city initiative is the low cost of the sensors. On the technical side, the units need to be flexible enough to cover different roles, and to be reconfigurable for a distinct target. The capability to interact with an already deployed infrastructure, like a preexistent web-server, is a favorable feature from both the financial and technical...
Now that it is becoming straight forward that industrial environments are a target for threats, hints will be provided here to face this issue with a focus on architecture and design. This approach is not treated by traditional means in detection of security vulnerabilities, like the static code analysis. Our approach explains how the quality of the code architecture against security attacks can be...
The currently used hardware validation architectures for Application Specific Integrated Circuits intended for automotive Engine Control Unit development are reviewed and a new architecture is proposed. An alternative to hardware validation by different simulation architectures is proposed and analyzed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.