The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, people use the internet extensively to meet their information needs, to socialize, to communicate, to handle formal and informal processes. The web-based information networks established for this purpose are growing day by day and reach a larger audience. Facebook, the world's largest social network, has reached 2 billion users. There are social information networks established for different...
Failure modes and effects analysis (FMEA) is a powerful and proactive quality tool for defining, detecting, and identifying potential failure modes and their effects. However, conventional FMEA process is sometimes difficult to implement due to workload required and subjectivity of the evaluations performed. Hence, automation of this tool can be useful for some application domains to objectively evaluate...
In this study, a system has been developed to provide meaning and classification of e-mails according to their contents. The aim of the work is to develop an intelligent inbox to assist in awareness of information security. In the designed system, a client is developed that can connect to the server and receive e-mails. A two-step analysis is performed on the received e-mails. For both stage analysis,...
In order to shorten the response times of aperiodic tasks in mixed task sets in real-time systems, this paper proposes an adaptive total bandwidth server (ATBS) algorithm based on aperiodic tasks with varying executing times. This method of reducing response times of aperiodic execution by using predictive execution times instead of worst-case execution times for deadline calculations in the total...
In the development of production systems, the engineering of Manufacturing Execution Systems poses a complex and time-consuming task. One of the specific tasks, which contribute to this fact, are the efforts necessary for the configuration of the shop floor gateway of an MES. In the past few years, a great number of promising approaches for the model-based systems engineering of production systems...
We present ‘ARClassNote’, an Augmented Reality application that enables users to save and share handwritten notes across multiple optical see-through Head Mounted Devices. In an augmented classroom environment, ‘ARClassNote’ makes it easier to achieve bilateral communication between instructors and students, and share written class materials without occlusion. We showcase how each component of ‘ARClassNote’...
This article presents a real-time control system for an experimental model of a water distribution system. The hardware and software implementation follows the latest trends in IoT and proves that such an architecture can be used for real-time process control in distributed systems. The control of flow is implemented using a multiple-model control algorithm for the pumping station. A method which...
Network Address Translation (NAT) allows multiple devices with private addresses to share one public address. NAT was mainly confined to home gateways, but with the exhaustion of the IPv4 address space, large-scale NATs have been deployed. Other technologies causing large-scale address sharing are on the rise as well (e.g. VPNs). Large-scale address sharing is problematic, since it limits the number...
In recent years, the PM2.5 (particulate matter with a mean aerodynamic diameter of 2.5 micrometers or less) pollution has become a very serious problem in China. Currently, there are three types of monitoring approaches: government-led monitoring, Wireless Sensor Networks (WSN) approaches and Participatory Urban Sensing (PUS). There are three limitations in these state-of-the-art research approaches:...
This paper briefly introduces the Command Query Responsibility Segregation (CQRS) and discusses the performance of the architecture. The pattern is separated from the business by modifying the behavior of modifying (adding, deleting, modifying the system state) and querying (without modifying the system state), making the logic clearer and easier to target different parts Optimization, and finally...
Campus network encounters serious security threats because of its expandable size and curious users. Due to the dramatic increase of network technologies and the urgent need to perform the work accurately, campus network is one example that now compels to step in with new trends confronted. This could be adopting robust technologies in order to reach high security, availability and globality. Standing...
For a long time, the sensitivity and criticality of data storage, processing, and transmission have hindered the wide utilization of IT and networks in the health care systems. Recently, the high availability, reachability, reliability, efficiency, usability and automation provided by the different cloud computing models paved the way to integrate the e-health systems with these cloud services to...
With the development of Internet technology, Automatic Train Supervision (ATS) simulation system with traditional C/S architecture is more and more inconvenience for its incompatibility with internet and the high cost of maintenance and development. It is more practical to use B/S structure. However, computer interlocking(CI) system with ATC system using UDP protocol is not compatible with remote...
With the extensive application of industrial sensor networks in the embedded field, the interconnection communication between the embedded node is proposed for the cross-LAN/WAN communication needs. Traditional communication schemes using proprietary protocols and sink nodes do not fully meet the interoperability needs. Web Services technology has the characteristics of openness, platform interoperability,...
Technicolor has been investigating how Mixed Reality technology could impact the future of home entertainment. We have designed and implemented a system to extend a standard TV experience with AR content, using a consumer tablet or a headset. A virtual TV mosaic is displayed around the TV screen and used as a GUI to control both TV and MR content. Using this interface, the user is able to switch TV...
In disaster scenarios or search and rescue applications an efficient, constructive and safe mission needs more than just robotic hardware and control. One major element is the interface between operator and robot. In this contribution, we present the approach of VTB-mediated teleoperation. This comprises (i) using standardized interfaces to integrate existing knowledge and libraries of the robotics...
In recent times, the electronic health record (eHealth) system is regarded as one of the biggest developments in healthcare domains. An eHealth system needs to be agile, reliable, and sustainable. Although the existing Personally Controlled Electronic Health Record (PCEHR) systems are claimed to be fully controlled by the patients, there are ways where the healthcare professionals and the database/system...
This paper presents a real-time Kvazaar HEVC intra encoder for 4K Ultra HD video streaming. The encoder is implemented on Nokia AirFrame Cloud Server featuring a 2.4 GHz dual 14-core Intel Xeon processor and Arria 10 PCI Express FPGA accelerator card. In our HW/SW partitioning scheme, the data-intensive Kvazaar coding tools including intra prediction, DCT, inverse DCT, quantization, and inverse quantization...
While Web applications have become pervasive in today's business, social interaction and information exchange, their usability is often deficient, even being a key factor for a website success. Usability problems repeat across websites, and many of them have been catalogued, but usability evaluation and repair still remains expensive. There are efforts from both the academy and industry to automate...
Encryption is often not sufficient to secure communication, since it does not hide that communication takes place or who is communicating with whom. Covert channels hide the very existence of communication enabling individuals to communicate secretly. Previous work proposed a covert channel hidden inside multi-player first person shooter online game traffic (FPSCC). FPSCC has a low bit rate, but it...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.