The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Kernel drivers are usually provided in the form of loadable kernel extensions, which can be loaded/unloaded dynamically at runtime and execute with the same privilege as the core operating system kernel. The unrestricted security access from the drivers to the kernel is nevertheless a double-edged sword that makes them susceptible targets of trojan attacks. Given a benign driver, it is now easy to...
This paper presents a transient based approach to diagnose high impedance faults (HIFs) on smart distribution grids. The algorithm does not require the knowledge of the feeder parameters and uses the discrete wavelet transform (DWT) to monitor fault-induced transients at strategic points of the power system, taking advantages of available Smart Grid communication channels. It allows the HIF detection...
One of the most important criteria for evaluation of voice service quality is blocking probability - statistical probability that telephone connection cannot be established due to insufficient transmission resources in circuit switched network. Transmission path is established through number of network elements connected by transmission links with associated capacities. Hence, voice service is directly...
With the proliferation of CBS (Core Banking Service) into various digital channels, the Indian banking sector has witnessed an alarming spectre of fraud. Information asymmetry amongst different agents is the root cause of fraud. In this paper, we propose a logical framework involving multiple agents of different personality types. The agents have different trust quotients for co-agents and information...
The use of information technology in research and practice leads to increased degree of automation of tasks and makes scientific experiments more efficient in terms of cost, speed, accuracy, and flexibility. Scientific workflows have proven useful for the automation of scientific computations. However, not all tasks of an experiment can be automated. Some decisions still need to be made by human users,...
Currently, there are two major technologies: FDT/ DTM and EDDL in the field bus device integration domain. But they are not consistent with each other, and lack of integration between two kinds of techniques. This paper describes that integrates these two technologies into OPC UA cLient/server architecture, and gives mapping of the DTM to the OPC UA address space node and EDD to OPC UA address space...
Modern power system monitoring, protection, automation, and control rely on communications and computing technology. Along with the benefits of these technologies come some risks of electronic or cyber attack. There are legitimate concerns about how inadequate information security (cyber security) is affecting electric power systems and other critical infrastructure. As a result of cyber security...
In recent years, several frameworks have been introduced to facilitate massively-parallel data processing on shared-nothing architectures like compute clouds. While these frameworks generally offer good support in terms of task deployment and fault tolerance, they only provide poor assistance in finding reasonable degrees of parallelization for the tasks to be executed. However, as billing models...
While control theory for bilateral teleoperation systems under constant time communication delay is well developed, the research on time-varying communication delay systems is still ongoing. Most wave-based approaches proposed in literature to deal with time-varying delay appear too conservative resulting in high degradation from the constant time delay case. We have already proposed a bilateral control...
This paper is concerned with correct specification and validation of quality attribute requirements (QAR's) that cross-cut through a diverse set of complex system functions. These requirements act as modifiers of the systems level functional requirements thereby having substantial influence on the eventual architectural selection. Because system designers traditionally address these requirements one...
In order to evaluate power quality more accurately, this paper presents a three-layer distributed online power quality monitoring system (PQMS), which uses the General Packet Radio Service (GPRS) wireless network as its communication channel. This PQMS consists of three parts: the power quality monitor (PQM), the monitoring software (MS) in upper computer and the web platform (WP). The PQM which is...
The function of internal audit in power system can be service-oriented to carry out sustainable development (SD) program. Requirements of internal auditors include being familiar with manufacturing process, industry related regularities, accounting treatments and mitigation management. Internal auditors can formulate policies and strategies of SD, help to plan, check resources allocation, carry out...
In this paper, a centralized and networked monitoring system for Valve-Regulated Lead-Acid Batteries (VRLA) based on electric power telecommunication network is introduced, detailed structure and software design are presented as well. The system transfers data and commands via the electric power telecommunication network, it is able to perform many critical functions for VRLA such as real-time monitoring,...
The implementation of a verification environment to check the behavior of a device-under-test using SystemC infrastructure is presented in this paper. SystemC is generally adopted in a system-level design methodology because of the capability of architectural model description and hardware/software co-design. The verification system implemented in this paper can explore design space using SystemC...
Any teleoperation system involving two distant devices is affected by communication delay due to the physical gap between the devices. Several approaches based on wave variables have already been proposed to deal with time-varying delay. However, these approaches are too conservative resulting in high degradation from the constant time delay case. In this paper, we propose a new control scheme for...
The paper proposes an autonomous integrated system performing remote monitoring activities for strategic objectives surveillance and risk prediction, focusing on monitoring of turbogenerator mechanical vibrations through communication channels. This system was designed to efficiently collect data regarding the turbogenerator mechanical vibrations and those induced in the turbogenerator support structure...
The multiple backhaul mobile access router (MAR) can provide high capacity and high performance Internet access for emerging mobile wireless applications. In this paper we improve the MAR with the capability to stripe traffic from clients over multiple available network devices. The MAR allows different backhauls to be used simultaneously and accommodates diverse policies. We present experimental...
The paper is devoted to present various intelligent, distributed network-based intrusion detection systems architectures and quality measures. Moreover an impact of network and their intrusion detection system architectures parameters on the intrusion detection systems quality is discussed.
Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address issues with "national" firewalls, citizen profiling and other "unethical" uses of information technology. Current steganographic methods that implement...
Previous studies show that the agile development models implement very few risk management practices. In this paper, we present and evaluate a model integrating the risk management and agile processes. The results show that the model provides a valid solution to address the lack of risk management, however, only in certain types of agile projects.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.