The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nonintrusive load monitoring (NILM) is a procedure for the analysis of the changes in the power (current and voltage) that goes into households and classifying the appliances used in the house according to their individual energy consumption. Utility companies use smart electric meters accompanied with NILM to examine the particular uses of electric power in households. Focus of this paper is on the...
The use of virtual patching tools to prevent attackers exploiting vulnerabilities of a web application is a widely adopted defensive approach. The constant evolution of applications, and thereby of attack techniques, requires a big maintenance and tuning effort to ensure that the remediation patches are working correctly. We put forward in this paper a tool supported process here security requirements...
In Ecuador, the ambulatory emergency system has a numbered paper handwriting information registry procedure, which means that the medical staff knows about the patient condition after his arrival to the health facility, in certain cases this could critically affect the quality of attention. This article details the proposal of a system which transmit detailed patient health status information and...
Materials and devices employed at the large CERN High Energy Physics (HEP) experiments and accelerators need to be first evaluated for their tolerance to radiation damage. IRRAD is one of the facilities used for this purpose at CERN. In IRRAD, samples are exposed to a Gaussian 12×12mm2-wide high-energy proton beam (24GeV/c) to given fluence levels. Custom-made Beam Profile Monitor (BPM) detectors...
The proposed NMS, called ITB NMS, is a web-based centralized management system used to manage and monitor the current condition of the entire existing network infrastructure clearly and concisely. ITB NMS is used to monitor a device or devices connected to the network-based LAN, WAN or Internet. ITB NMS is able to monitor the condition of a device or monitor the activities being performed by a device...
Motivated by the need to regulate and regularly inspect construction sites, we developed a real-time robust drone system that performs site inspection and violation detection in construction sites. The proposed system uses the drone to inspect and monitor numerous types of construction sites remotely from any control station or a nearby locations. Our drone system was developed as an entry to participate...
Mobile and smart health care exists some questions and challenges including signs and symptoms information collection, remote real-time detection and online information push. In this paper, remote network vital sign information monitoring system and cloud data storage platform is designed and implemented to solve the problems mentioned above. The system is realized based on STM32 wearable hardware...
An artificial Satellite's health and functioning in space is monitored by analysing the stream of Telemetry Data received at the Satellite Ground Control Centre. This data is received continually during the entire mission life of the Satellite. Hence a huge volume of Data is collected for any given satellite. Data Mining techniques are now regularly applied to analyse such large quantity of data for...
Content Delivery Networks (CDN) is one of the most promising technologies that enhance performance for its customers' websites by redirecting web requests from browsers to geographically distributed CDN surrogate nodes. Due to the flexible nature of CDN, it suffers from various security and resource allocation issues. There are several techniques have been implemented in literature to thwart the attacks...
This paper introduces the reasons for big data analytics in distribution network studies and potential benefits it could give. Summary of the most common data mining methods used in power system studies is also given, followed by a comparative analysis. A use case is shown at the end in order to present some examples of extraction of useful information from raw data stored in a real distribution utility's...
Due to forgetfulness, people with dementia need assistive technologies for managing medications. In this paper we present a Kinect-based smart system for unobtrusive medication adherence monitoring of people with memory-degrading conditions. Unlike existing pill dispensers, our system not only reminds a patient on time of medicine intake and provides the corresponding medication dose, but also vocally...
In this paper, we will model a learning scenario adopting case study strategy by using recursive entity modeling method (REMM). The purpose is, on the one hand, to test the modifications that we have brought to REMM in the previous work, as well as to demonstrate the ability of this method to model active learning strategies, and on the other hand, to design a pedagogical scenario model based on case...
We have developed and deployed an e-Government system named E-FES that facilitates citizens' and employees' access to local government information and services in a local registry office (Bureau d'état Civil “BEC”). E-FES system is running since 2006 in different municipalities in both rural and urban areas. Accordingly, we have been able to use a considerable amount of data which enabled us to design...
Low-frequency-to-high-frequency ratio (LF/HF) of heart rate variability has been used as a maker of stress or sympathetic predominance in cardiac autonomic activity. Laboratory studies, however, indicate that LF/HF increases with standing and decreases with lying. We hypothesized that LF/HF in ambulatory monitoring is associated with the ratio of time in lying position during the monitoring (lying...
In this article we describe the implementation of remote monitoring and control for multiple and independent experiments, namely, ecosystem replication experiments. First by presenting the main concepts behind the system architecture, and ultimately its design, and secondly by discussing its implementation. The system makes use of IEEE 802.15.4 Standard for Wireless Communications, a BeagleBone Black...
In this paper we propose a new adaptive learning framework that classifies learner's based on individual preferences in terms of understanding and processing information. This framework generates learner's learning style based on Felder Silverman learning style model and suggest learning content based on learning style. The paper outlines how the system allows instructors to monitor learner's learning...
BigDAWG is a polystore database system designed to work with heterogenous data that may be stored in disparate database and storage engines. A central component of the BigDAWG polystore system is the ability to submit queries that may be executed in different data engines. This paper presents a monitoring framework for the BigDawg federated database system which maintains performance information on...
It is well known that the intensive care unit (ICU) is mainly utilized in the medical field. Recently, it has been extended in power industry. For example, the ICU on the transformer can detect the potential defects. Combined with multiple monitoring systems along with the experience of operators, the evolution of the defect can be well determined. Hence, the failure can be effectively prevented....
We present an ongoing research project, namely Learning Intelligent System for Student Assistance (LISSA). LISSA is aimed towards supporting the learning process by providing each student with an individual assistant that monitors the student's program and tasks that need to be executed. LISSA is part of the Virtual Education Space (VES) [1] which in turn consists of different autonomous components...
In this paper, a power-signature-based Bayesian multi-classifier is proposed to identify various operational modes of a complex machinery system that can help determine the energy contribution of different operation modes, identify potential energy hot-spots and provide basis for more accurate energy consumption calculation. This technology can also help process experts and managers to perform the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.