Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Attacks on an operating system kernel using kernel rootkits pose a particularly serious threat. Detecting an attack is difficult when the operating system kernel is infected with a kernel rootkit. For this reason, handling an attack will be delayed causing an increase in the amount of damage done to a computer system. In this paper, we discuss KRGuard (Kernel Rootkits Guard), which is a new method...
Software Defined Networking (SDN) is an approach developed to facilitate next generation computer networking by decoupling the traffic control system from the underlying traffic transmission system. One key focus in the transition of next-generation computer networking is the service management improvement of network connectivity services. Connectivity across the global digital network requires a...
A system for the excitation of numerous capacitive loads such as electroluminescent devices is presented. It is based on a controller equipped with up to 16 driver boards which are based on an arbitrary waveform generator. Besides the three template waveforms, any requested waveform can be generated by a Digital-to-analog converter whose output is amplified. Signals can be generated with up to 400...
On a cluster system running behind the Cloud computing, multiple processes are generated from most applications and then executed on multiple computing nodes. Their processes communicate with each other during their execution. The communication performance among multiple processes plays an important role in the total execution performance of an application. The SDN-enhanced JMS, which we have developed...
Cyber-Physical Systems are integration of computer-based equipment used in industrial automation, embedded systems, control systems and etc. Computer-based equipment needs to be protected against unauthorized access and control. The widely accepted approach to computer security is based on security in depth, meaning that the computer system is viewed as a layered structure and security is introduced...
This paper addresses the mixed ℋ2/ℋ∞ control problem for linear discrete-time systems subject to packet dropout, which is modelled by a Bernoulli process. The Nash game methodology is adopted to deal with such multi-objective control problem over lossy channel, and a solvability condition is given through solving two coupled algebraic Riccati equations (AREs). The bounded causal equilibrium strategies...
This work presents the development of a remote laboratory service and its application during the teaching of Control Systems subject of third course in a Telecommunication Technology and Service Engineering degree. The application was successful allowing the student to control the same components as remotely, in a similar way as they were in the laboratory. There was an elevated interest by the students,...
Building automation systems has gained huge attraction in building services sector with the development of new concepts in energy conservations. A multifunctional building automation controller has been introduced to cater this demand. The plug-and-play type suggested controlling system consists of two major components; external sensing device and main controlling unit mounted in-house. The external...
Behavior Trees (BTs) is a way of organizing the switching structure of a control system, that was originally developed in the computer gaming industry but is now also being used in robotics. The Teleo-Reactive programs (TRs) is a highly cited reactive hierarchical robot control approach suggested by Nilsson and And-Or-Trees are trees used for heuristic problems solving. In this paper, we show that...
Large scale applications in data centers are composed of computers connected with a network. Traditional network switches do not perform routing based on packet contents. Thus, packets cannot be transmitted to the optimal computer for the request which is written in the packet payload. On the other hand, Deeply Programmable Network (DPN) switches can completely analyze packet payloads and perform...
The article shows the design and implementation of a gesture control system, which determines the gesture from the movement of the hands. The presented gesture controller system can be built relatively easy from cheap components, so it is ideal development goal in case of a students' project also in the field of project based learning. The movement detected with distance measurement sensors, and the...
On-board computer (OBC) is a very important component in any On-Board Control System to perform guidance and control along with critical operations during the mission, should be designed to execute several tasks that need to be executed in deterministic precise order and for accurate periods of time. Real-time control systems require instantaneous execution of commands either through hardware or software...
Anti-Tank Guided Missile (ATGM) is Indonesian Army' main defense equipment, whose availability depends on purchasing from abroad. The dependency to other countries allows many weak points and makes Indonesia merely a user, which cannot do anything against the import of defense equipment. Moreover, as a user having obligation to report the status of the defense equipment to the producer, Indonesia's...
Factorization is one of the most important problems in the theory of numbers and a modern asymmetric cryptography. Known methods of factorization are quite cumbersome; therefore, require significant computational resources for processing multi-bit numbers. The relevance of the factorization problem is dictated also by uncertainty regarding the theoretical foundation of stability for the disclosure...
In this paper, we study whether any continuous-time disturbance to a continuous-time plant can be equivalently represented by a sampled input disturbance to a sampled-data model. With the help of the sampled-data system theory, we show that such equivalent sampled disturbance exists for almost sampling period and even for mismatched continous-time disturbances. Moreover, it is also discussed that...
Currently, cloud computing offers flexible, dynamic and cost effective computing outsourcing, but it limits these economic and operational benefits to non real-time and non safety-critical systems. This is because of the lack of alternative control, supported by current cloud infrastructures, in case of a broken cloud link. While steps have been taken in using cloud infrastructures for soft real-time...
Steady state visual evoked potentials (SSVEPs) are the brain signals induced by gazing at a constantly flickering target. Frame-based frequency approximation methods can be implemented in order to realize a high number of visual stimuli for SSVEP-based Brain-Computer Interfaces (BCIs) on ordinary computer screens. In this paper, we investigate the possibilities and limitations regarding the number...
This paper is a part of work on the attempt to implement the continuous control system which dynamically derives the control law during its operation, on basis of a model-based control algorithm. The measurements obtained from the sensors are dynamically included or excluded depending on the availability of individual sensors. The prototype application was developed in the JADE environment, and its...
Handwriting disability is one type of learning disability that is difficult to be detected as it may requires experts and professionals to diagnose. Owing to this matter, a computerized character recognition application is very much in need to ease the process of detecting children with learning disability based on handwriting. For any character recognition method, it's critical to extract the class...
Oil is one of the most important energy sources in the world, due to the uneven distribution of it, its transportation is an important step in the process of oil production. With the development of information technology, the traditional way of pipeline transportation has been unable to meet the requirement of high speed and high accuracy of product oil transportation process. A fuzzy PID control...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.