The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The number of persons 65 years of age or older are increasing in Japan. Among them the number of living alone not in nursing home but in his or her own home is predicted to increase more and more. On the other hand smart meters have been prevailing in recent years. Therefore we have been developing the monitoring system for watching them by using the smart meters. We prepared two algorithms of “average...
Development and operation of multi-cloud applications, i.e. applications which consume and orchestrate services from multiple independent Cloud Service Providers, are challenging topics nowadays. Systematically addressing security assurance in such applications is an additional issue, unsolved at state of art. This paper introduces the MUSA DevOps approach to holistic security assurance in multi-cloud...
Research objects were designed in data-intensive science under the premises of interoperability and machine-readability to describe scientific processes and findings including all the resources that were used in the research endeavour. In this poster we present our work with Earth Science communities, that have embraced the research object model for long-term preservation and reuse of knowledge, to...
The provisioning and exploitation at a global scale of environmental and geophysical data requires advanced automation and governance mechanisms that enable (meta)data interoperability but also the exchange of formalized scientific concepts and methods. In this paper we introduce recent efforts in such direction, based on scientific workflows and research objects as enablers of such vision. The former...
Scientific research is data-centric, relying on the acquisition, management, movement, analysis, and sharing of data. Proficiently managing the end-to-end lifecycle of scientific data is non-trivial and comprises many time consuming and mundane tasks. While individual tasks are not prohibitive, when done repeatedly and frequently they represent a significant strain on researchers. We posit that a...
An imitating model for monitoring the work of a workshop that executes several technological processes was developed. Model was developed with usage of probability theory methods, mathematical statistics, and the theory of random processes. The model visualizes a certain set of states of the executed operations belonging to the technological process and allows user to track the percentage of failure...
The expansion of Internet of Things (IoT) and the evolution in communication technologies have enabled homes, cars even whole cities to be network connected. However, during an emergency incident, IoT devices have not been used to trigger emergency calls directly to healthcare providers mainly due to their constrained capabilities and lack of support session-oriented communications. Moreover, emergency...
A set of methods for estimating the parameters of the production process is proposed. This set includes expert assessments, Pareto analysis and elements of neural networks based artificial intelligence. The set forms up the methodology for assessing the state of the production process and forecasting its implementation. The sequence of application of individual methods is substantiated. Algorithms...
Learning Analytics focuses on improving learning process by studying and analyzing data produced during the process itself. It covers the collection, measurement, analysis, reporting and knowledge discovering on data about students, teachers and institutions. Learning Analytics has been widely developed in Anglo Saxon countries. USA, United Kingdom, Canada and Australia are amongst the main contributors...
Early medical care has gained academic attention with the accelerating of aging process and the prevalence of chronic diseases. Intelligent wearable monitoring system used by the ordinary family has broad market application prospect. The portable system using STM32F405 chip and the Beidou navigation. It can collect real-time health parameters and send the coordinates of the user back. MT2511 is used...
Clinical research registries need to be driven by data quality to improve the outcome of clinical trials and to provide the possibility to facilitate new research initiatives. The International Niemann-Pick Disease Registry (INPDR) is one such example of a clinical research registry. Unlike other registries where data quality is largely based around best effort manual data entry, the INPDR registry...
Unplanned hospital readmissions bring large social and economic costs to both patients and healthcare organizations. We propose a mobile health platform with the goal of reducing the current high rates of unplanned readmissions, in order to reduce costs while maintaining or improving the quality of care. We designed the platform to mimic intelligent behavior in hospitals — in particular, the behavior...
Honeynet is a network architecture that utilizes multiple honeypots to deceive attackers and analyze their malicious behaviors. However, existing honeynet has not evolved much since its latest architecture, Gen-III, which was proposed in 2004. Meanwhile, security threats and techniques used by adversaries have been continuously advanced. As a result, honeypot architecture is suffering from its limited...
Industrial Control System (ICS) is used to monitor and control critical infrastructures. Programmable logic controllers (PLCs) are major components of ICS, which are used to form automation system. It is important to protect PLCs from any attacks and undesired incidents. However, it is not easy to apply traditional tools and techniques to PLCs for security protection and forensics because of its unique...
Respiratory rate during sleep is one of the important vital sign for home healthcare. Therefore, noncontact respiration monitoring method during sleep without uncomfortable feelings caused by sensor-insertion is needed. The purpose of this study is to develop the noncontact respiration monitoring method during sleep using only low priced web-camera. The innovative point is to adopt the bed cover with...
Risk recognition training is an important training in construction companies to avoid work-related accidents. The existing risk recognition training is usually conducted on an illustration including explicit risks. However, it is difficult to express dynamic scenarios and surroundings of the scene due to the still illustration. In this study, a video based risk recognition training tool with an eye...
AE measurements of foliage plants were examined for the activity monitoring. The electret condenser sensor (ECS) could detect many AE events mainly in daytime at stem of Schefflera and Olive tree. AE behaviors of these plants were strongly influenced by the drought stress Number of detected AE also largely fluctuated by the weather conditions. As a result, AE method could be useful approach to enhance...
In the past decades there was an exponential growth of computer networks and computing devices, connecting computers with a size in the m3 range. The Internet-of-Things (IoT) emerges connecting everything, demanding for new distributed computing and communication approaches. Currently, the IoT connects devices with a size in the cm3 range. But new technologies enable the integration of computing in...
Open systems are often submitted to rules and norms in an attempt to guarantee its well functioning and prevent selfish (e.g. free-riding) or unsustainable (e.g. tragedy of the commons) behaviour. Associated to the norms, there is usually also a sanctioning structure responsible to prevent and punish non-compliance enforcing conformity. Without disregarding the importance of these structures, we investigate...
Crowd-based requirements engineering (CrowdRE) is promising to derive requirements by gathering and analyzing information from the crowd. Setting up CrowdRE in practice seems challenging, although first solutions to support CrowdRE exist. In this paper, we report on a German software company's experience on crowd involvement by using feedback communication channels and a monitoring solution for user-event...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.