The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the evolution towards the Fifth Generation of Mobile Communications (5G), Software-based Networks are paving the way to a radical transformation of Network Operators infrastructures. Novel technologies like Network Function Virtualisation (NFV) and Software Defined Network (SDN) are enabling new way of managing on-demand network resources. Focusing on the Mobile Core Network architecture, Service...
Software-defined networking (SDN) addresses pressing networking problems such as network virtualization and data center complexity. By separating the control plane from the data plane, SDN introduces a new abstraction layer. This new abstraction layer is typically implemented by means of a so-called SDN controller. SDN applications can interact with the controller to ensure network functionality....
As an emerging approach to support fast delivery of software features with reliable quality, DevOps attracts more and more practitioners and shows the potential to become one of the mainstream approach for software development and operation. Many universities begin to offer DevOps related courses to the students majored in software engineering and computer science. However, as a critical part of a...
Wireless Sensor Networks present several advantages when compared to wired ones, among them, the low consumption and simplicity of installation. In some cases, energy consumption may be so low as to allow the use of energy harvesting techniques, as in the case of EnOcean protocol. In other networks, it is necessary to meet specific requirements, such as in industrial ones, where communication must...
Currently, literature points out the lack of studies about collaborative virtual environments with intelligent tools capable of providing automatic evaluation feedback of different collaborative procedures (e.g., surgical, military training). In addition, there is a lack of classifications and methodologies for the implementation of CVEs with simultaneous evaluation of multiple users, making it difficult...
The article aims to present the results of a usability analysis of Augmented Reality systems developed for food packaging. For this, an evaluation of two applications available in the market was made, based on the heuristics proposed by Jakob Nielsen. Twenty-six specialists participated in the evaluation. From the results of the analysis, guidelines were generated for the elaboration of an application...
In the actual GNSS space signal quality monitoring system, the performance of the channel is not ideal, resulting in the signal transmitted to the receiver is inconsistent with the signal received by the antenna. Studying the characteristics and designing the equalization algorithm of the channel could restore the received signal to the real state, which will ensure the quality monitoring results...
An approach is proposed to reasoning problems based on Petri nets (PNs). First, a method is presented modeling a world by describing Boolean variables as PN loops. Second, an algorithm is introduced to rearrange inference rules as conjunctive normal forms (CNFs), and, in turn, CNFs are transformed into linear constraints. Consequently, a knowledge base system (KBS) PN is obtained by designing monitor...
In the context of the Open Network Automation Platform (ONAP), we develop in this paper a resource allocation strategy for deploying Virtualized Network Functions (VNFs) on distributed data centers. For this purpose, we rely on a three-level data center hierarchy exploiting co-location facilities available within Main and Core Central Offices. We precisely propose an active VNFs' placement strategy,...
Cheetah flows, which are high-rate flows, can cause increased packet delays and losses in other flows. Leveraging the flexibility offered by the NFV paradigm, our proposed Cheetah Flow Identification Network Function (CFINF) uses a novel method in which a new measure, short-duration flight rate, which is the rate of a flight of packets received over a fixed (short) time interval, is computed and compared...
Ongoing evolutions in the Network Function Virtualization (NFV) area show that software will play an increasingly important role within the telecommunication industry. It enables telco providers to faster introduce telecom services, combined with new possibilities to optimize and fine-tune operational performance. New virtualization and softwarization methods support fine-grained scaling of resources...
The accuracy provided by traditional sampling-based monitoring approaches, such as NetFlow, is increasingly being considered insufficient to meet the requirements of today's networks. By summarizing all traffic for specific statistics of interest, sketch-based alternatives have been shown to achieve higher levels of accuracy for the same cost. Existing switches, however, lack the necessary capability...
This paper demonstrates a methodology for how the organizations that employ complex enterprise systems of systems can significantly improve cyber defense while decreasing overall operating costs by using formal methods. The paper demonstrates an approach that uses an event-based methodology to formalize all types of enterprise behavior, to include system, human, and environmental events.
The automatic detection of anomalies in Active and Assisted Living (AAL) environments is important for monitoring the wellbeing and safety of the elderly at home. The integration of smart domotic sensors (e.g. presence detectors) and those ones equipping modern mobile robots (e.g. RGB-D cameras) provides new opportunities for addressing this challenge. In this paper, we propose a novel solution to...
Background: BCR-ABL1 fusion gene is the molecular hallmark of most cases of chronic myeloid leukaemia and some cases of acute lymphoblastic leukaemia. All CML cases that have Philadelphia chromosome, t (9; 22) (q34; q11) translocation express BCR-ABL1. For both diagnosis and minimal residual disease monitoring, Real Time PCR is used to quantify BCR-ABL1 in peripheral blood. However, messenger RNA...
We are living in an ageing population with an escalation in chronic illnesses including dementia and other age related diseases. People living with dementia often continue to live at home and are supported by caregivers and next of kin. It is often important to monitor the wellbeing of people living with dementia in order to measure their level of independence and to provide proper support at the...
In this paper, we propose and evaluate the application of unsupervised machine learning to anomaly detection for a Cyber-Physical System (CPS). We compare two methods: Deep Neural Networks (DNN) adapted to time series data generated by a CPS, and one-class Support Vector Machines (SVM). These methods are evaluated against data from the Secure Water Treatment (SWaT) testbed, a scaled-down but fully...
It is well recognized that air quality inference is of great importance for environmental protection. However, due to the limited monitoring stations and various impact factors, e.g., meteorology, traffic volume and human mobility, inference of air quality index (AQI) could be a difficult task. Recently, with the development of new ways for collecting and integrating urban, mobile, and public service...
Traffic Engineering (TE) accommodates traffic efficiently by dynamically configuring the routes so as to follow traffic changes. If traffic changes frequently and drastically, the interval to perform the route reconfiguration should be set to a short value, to follow traffic changes. To shorten the interval, obtaining the traffic information becomes a problem; measuring traffic information accurately...
An autonomous Internet of Things (IoT) wireless sensor network (WSN) powered by a solar energy harvester with low power electronics is presented in this paper. The power supply is a critical challenge for IoT sensors as many of them normally have limited lifetime due to the battery with limited capacity used. The WSN system, sensor node electronics, and the energy harvesting techniques are all configured...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.