The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud Security is still considered one of the main factors inhibiting the diffusion of the Cloud Computing paradigm. Potential Cloud Service Customers (CSCs) do not trust delegating every kind of resources and data to external Cloud Service Providers (CSPs). The problem grows in complexity due to the increasing adoption of complex supply chains: CSPs that offer Sofware-as-a-Service (SaaS) cloud services...
Ensuring connectivity among mobile nodes is significantly important to the success of many critical applications, like military, where the loss of connectivity can lead to the failure of the mission and also proved to be challenging in particular when mobiles nodes have heterogeneous mobility pattern i.e., they are moving in several directions at different speeds. In this paper, we propose a new Heterogonous...
Modern mobile pervasive applications focus on context awareness that monitors a diverse range of personal domains. In order to infer contextual information, most of these applications require the collection of raw data from sensors which are either embedded in personal smartphones or worn by the user. Critical context-aware applications rely on continuous accurate monitoring of the user's current...
Since the inception of the World Wide Web, security agencies, researchers, and analysts have focused much of their attention on the sentiment found on hate-inspired web-forums. Here, one of their goals has been to detect and measure users' affects that are expressed in the forums as well as identify how users' affects change over time. Manual inspection has been one way to do this; however, as the...
Multi-robot applications in industrial scenarios have to cover a large spectrum of tasks reaching from low level control functions on the machine level up to high level coordination tasks. The configuration of these tasks related to single or multi-robot algorithms depends on the individual requirements of the scenario (i.e. number of entities, communication bandwidth, failure assumptions). Therefore,...
In the aim to optimize maintenance costs of switchgear equipment, there is a general trend in the utilities to move from systematic (time-based) maintenance to condition based maintenance and risk based maintenance, taking advantage of modern diagnostic tools and the transformation of the network to the Smart Grid. The application of many commonly used diagnostic methods of switchgear is off-service,...
Information and communication technologies play an increasingly important role in society, in the sense that all areas and professions make use of digital resources. The school can not be brushed off this reality, aim to create full subjects and integrated in society today. Educational software can be used very early in the education of children, but they must be carefully and monitoring. This article...
Integration of collaborative learning in MOOCs (Massive Open Online Courses) is an open research challenge. However, team formation and subsequent management are complex tasks that depend on multiple factors, both pedagogical and technological. To fulfill these tasks, it would be helpful to provide teachers with supporting tools. This paper analyzes the factors influencing the formation of teams in...
In this paper we present an approach to add self-adaptive features to software systems not initially designed to be self-adaptive. Rapid changes in users needs, available resources, and types of system faults are everyday concerns in operating complex systems. The ability to face these issues in a (semi-)automatic fashion is a welcome feature. MAPE-K (Monitor, Analyze, Plan, Execute — Knowledge),...
This paper presents a cost controlling model for maintenance of wind energy plants (WEP). The cost model is developed as a decision instrument in cooperation with a maintenance process model of WEP. The entire model is specifically designed based on a qualitative study of state-of-the-art models/systems and collection of operational and managerial requirements from wind park operators and maintenance...
This paper presents a load disaggregation method for the monitoring and supervision of the load profiles of individual equipment in an HVAC installation. The method takes advantage of the wealth of sensor and actuation information found in Building Energy Management Systems in order to find correlations between the state of operation of each machine and the power demand of the installation. This enables...
the idea of Service-Oriented Computing (SOC) is to understand users' requirements for Service-Based Applications (SBAs). We propose an adaptation-centric approach which allows: (i) modeling users' requirements for Service-Oriented System with the MAP formalism using an Intentional Service Model (ISM); (ii) ontology and the aspect according to the contextual changes in order to inject it in the process...
Trust model has been suggested as an effective security mechanism in distributed network environment. Considerable researches have been done on trust evaluation and trust prediction. Traditional methods take the historical behavior data into consideration to predict the trust value of the network entity. However, the context of the network entity is seldom taken into account. It is obvious that the...
Estimating signaler demand is critical for ensuring signaling workstations are both feasible to run, and acceptable to staff. While human factors tools exist, they are typically manual, time consuming and rely of the skill of an expert. One solution, explored in this paper, is to use signaling simulators to assist in the estimation of demand.
This paper proposes an approach for adopting alternative workforce in an organization. Alternative workforce refers to a pool of workers who work for the organization as contract workers or as crowd workers for a set of specific tasks or duration. Adoption of crowd workers as an alternative workforce is gaining a lot of attention these days. However, it is still not widely adopted by big organizations...
Human-robot collaboration will increasingly take place in human social settings, including contexts where ethical and honest behavior is paramount. How might these robots affect human honesty? In this paper, we present first evidence of how a robot's presence affects people's ethical behavior in a controlled field study. We observed people passing by a food plate marked as “reserved”, comparing three...
An autonomous robot system was equipped with basic means to monitor the users' success/failure in following a robot's verbal-gestural deictic reference to an object and — in case of problems - to provide additional help, i.e. to suggest a ‘repair’ action. A real-world field trial with the robot acting as museum guide constitutes the basis for analysis of the users' reactions to the first reference...
With the rapid development of regional economy in Shandong Province, the demand of electric power increases rapidly. So, the development of the substation construction and its status information detection system has led to the massive power equipment status information data, which needs to be sorted out and standardized work. In this paper, the MapReduce technology is used for the degradation processing...
The current research aims to investigate information visualization found within students' self-regulated learning skills while they are engaged in an interactive learning module. While the cognitive actions represent contextual activities found when students use interactive learning modules, the metacognitive component was represented by planning, monitoring, and regulating strategies. Students at...
Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisational context, allowing employees to work using their personal devices. However, as personal mobile devices are perceived as less secure than those provided by the organisation, BYOD has risen security concerns about corporate information being accessed by mobile devices from inside and outside the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.