The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed Denial of Service (DDoS) is one kind of attacks using multiple computers. An attacker would act as a fake service requester that drains resources in computer target. This makes the target cannot serve the real request service. Thus we need to develop DDoS detector system. The proposed system consists of traffic capture, packet analyzer, and packet displayer. The system utilizes Ntopng...
The traditional auto-reclosing method in relaying cannot meet the requirements of the distribution network with small hydropower in case of faults. In order to provide reliable guarantee for safe operation of transmission line, on the basis of the improvement measures by the reclosing device in the practical engineering, a reclosing device adapted to synchronization line of small hydropower station...
A continuous real-time data acquisition and communication equipment based on Advanced RISC Machine and Field Programmable Gate Array is designed and developed, on the basis of which an on-line monitoring and fault diagnosis system for high voltage circuit breaker is realized. Mechanical, electrical and environmental parameters of the switching process can be gathered by this system. The function modules...
Methods and ways to perform denial-of-service attack are analyzed and classified in this work. Famous Denial-of-Service attack classifications are reviewed and analyzed. New elements of modern DoS attack classification are proposed.
Chemical pesticides security and configuration problems of low precision blending process design a kind of liquid chemical pesticide ingredient line automatic control system. System consists of Host-Computer, PLC, weighing instruments and touch-screen configuration, which use Visual Basic develop design software, with data collection, storage and query capabilities. Omron PLC as the master controller...
Anti-Tank Guided Missile (ATGM) is Indonesian Army' main defense equipment, whose availability depends on purchasing from abroad. The dependency to other countries allows many weak points and makes Indonesia merely a user, which cannot do anything against the import of defense equipment. Moreover, as a user having obligation to report the status of the defense equipment to the producer, Indonesia's...
Cyber culture of virtual-macro-micro-computing, which formulates, explains and predicts the current processes and phenomena monitoring and control technology in the physical and virtual space is proposed. The verbal and structural definitions of the main types of computing, based on current trends evolution of planet cyber ecosystem are represented. The universal model of MAT-computing: <Memory,...
Cyber culture of the smart university creates the social significance of technological leadership. Internet and cyberspace change all the processes of life of each person. It is necessary to create a new market-oriented model of scientific and educational processes within the Smart Cyber University (SCU). The concept integrates the achievements of classical universities, technological cyber culture,...
Monitoring cognitive workload from speech signals has received a lot of attention from researchers in the past few years as it has the potential to improve performance and fidelity in human decision making. The bulk of the research has focused on classifying speech from talkers participating in cognitive workload experiments using simple reading tasks, memory span tests and the Stroop test, typically...
While autonomy developers have been able to take advantage of external control interfaces on intelligent vehicles for years, they have typically had to choose between control architectures and interfaces that only allowed them to use the existing behaviors of the vehicle (task-level control) or those that allowed them to set desired control values (setpoint control) but then required them to re-invent...
Electroencephalography nowadays is used for diagnosing and monitoring patients, suffering from variety of mental disorders, deceases and other conditions. This challenges technology to provide fast connection with minimum data losses. This paper examines the required network parameters for ensuring all measured brain waves to arrive to the doctors' computer in real-time.
La rehabilitación física de pacientes está sufriendo una modificación en su forma con la llegada de las nuevas tecnologías que permiten captar el movimiento de los pacientes. Esto supone un gran avance que facilita la repetición constante de los ejercicios con una correcta monitorización de posibles errores, la guía para que los pacientes realicen los ejercicios de forma correcta, evita costosos e...
Information and communication technologies play an increasingly important role in society, in the sense that all areas and professions make use of digital resources. The school can not be brushed off this reality, aim to create full subjects and integrated in society today. Educational software can be used very early in the education of children, but they must be carefully and monitoring. This article...
In this paper, we proposed tone mapping method which uses threshold function. It was impossible for conventional Multi-Scale Retinex algorithm to express detail parts due to damage in bright region of dynamic range at compression processing. We reduce the damage, which occurs in tone mapping process, by setting the threshold of Log Scale image in this algorithm. The experimental tests demonstrated...
Nowadays, the attacks are no longer performed from a single computer but from thousands, sometimes millions of systems that are located all over the globe and are grouped in a network called botnet. The most widely used technique to control a botnet is to try to connect to many domain names, generated according to an algorithm called domain generating algorithm (DGA). In this paper we present different...
Though several assistive technologies are available for home-based rehabilitation of stroke patients, people are not using the same for several reasons. Lack of technical competence, chance of electrocution is some of such issues. The cables/ wires of different instruments, measuring devises, rehabilitation systems are often the source of infection; causes of electrocution, discomfort and immobility...
Firewall is a standard security utility within the Microsoft Windows operating system. Most Windows users adopt it as the default security option due to its free availability. Moreover, Windows Firewall is a widely used security tool because of the large market share of the Microsoft Windows operating system. It can be customised for filtering of network traffic based on user-defined inbound and outbound...
In this work, clinical results of a wireless recording system for intraoperative neurophysiological monitoring during a spine correction surgery are reported. The wireless modules connecting directly to the subdermal needle electrodes transmit the waveforms detected in certain muscle areas to a computer via telemetry for real-time display, analysis and storage. Sufficient gain, bandwidth and digitalization...
Attacks of Ransomware are increasing, this form of malware bypasses many technical solutions by leveraging social engineering methods. This means established methods of perimeter defence need to be supplemented with additional systems. Honeypots are bogus computer resources deployed by network administrators to act as decoy computers and detect any illicit access. This study investigated whether a...
Ultrasound is a viable imaging technology in remote and resources-limited areas. Ultrasonography is a user-dependent skill which depends on a high degree of training and hands-on experience. However, there is a limited number of skillful sonographers located in remote areas. In this work, we aim to develop a real-time video streaming platform which allows specialist physicians to remotely monitor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.