The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents methods for regulating the elevator's cabin speed and position for purposes of traffic control. It contains four stations. On every station there are two position sensors and cabin call button. Cabin speed regulation is realized with microcontroller, incremental encoder and chopper, where chopper controls DC motor speed. A simple traffic control is written for ARDUINO platform.
The article deals with the system and methods for determination of the pressure distribution around aerodynamically shaped body immersed in airflow and further calculations of aerodynamic characteristics. Measurements are conducted in the subsonic closed-loop wind tunnel AT-1, in Aerodynamics Laboratory of Department of Aeronautics at Faculty of Transport and Traffic Sciences. Pressure distribution...
Developing technologies and meeting the demands and needs of a wide range of different users had rather important influence on design of user interfaces of web applications. In such a dynamic context, storytelling in web interfaces design represents a new approach which aims to realize a more attractive interfaces that also ensure and encourage the participation of the users themselves. This paper...
Business intelligence (BI) allows companies to analyze business information in order to support successful decision making. Currently, the research on the level of BI maturity in Croatian and Slovenian companies is limited. In addition, several BI maturity models have been developed, but most of them are not comprehensive. In order to shed some light to this issue, this paper is focused on two goals:...
ETL (Extract Transform Load) process is the industry standard term for data extraction, transformation and loading into the Data Warehouse (DW). ETL process is the most resource demanding process in DW implementation and typically has to be evolved and maintained for the duration of the DW. To facilitate the development and maintenance of ETL processes many ETL tools have been developed featuring...
Big social data are now everywhere. They constitute a rich source of knowledge that is prone to be explored and mined in order to support advanced big data analytics. Multidimensional mining identifies a promising collection of tools to this end. Following this recent trend, in this paper, we provide an overview on two state-of-the-art proposals that show how big data analytics over big social data...
Possible application of tungsten dichalcogenides as gas-sensing elements is discussed in this paper. The experimental results on sensitivity of pristine and niobium doped WS2 and WSe2 to acetone and ethanol gases are presented. Polycrystalline powder specimens were obtained by high temperature solid-state synthesis from the stoichiometric mixture of pure elements. Two types of samples were studied:...
Double-Emitter Reduced-Surface-Field Horizontal Current Bipolar Transistor is analyzed by the device simulations. Geometrical parameters of the local p-well substrate, which is used to introduce the second drift region are investigated. It is shown that the length of the p-well lpw=0.5 µm is sufficient to obtain efficient electric field shielding and BVCEO independent of the transistor current gain...
Today's modern homes are becoming complex live systems in which virtually all functionality, from lighting and heating control to security and occupancy simulation, is mediated by computerized controllers leading to IoT future. The smart nature of these homes raises obvious security concerns and history has shown that a vulnerability in only one component may provide the means to compromise the system...
The security of modern web applications is becoming increasingly important with their growing usage. As millions of people use these services, the availability, integrity, and confidentiality are critical. This paper describes the process of penetration testing of these applications. The goal of such testing is to detect application flaws and vulnerabilities and to propose a solution to mitigate them...
This study was based on the validated Users' Information Security Awareness Questionnaire (UISAQ). Authors gathered information on risky behavior and security awareness among 355 pupils from three secondary schools: General program secondary school (Gymnasium), Business and administrative high school and Trade school. Aim of the study was to test adapted version of UISAQ questionnaire on secondary...
The Semantic Web can be used to enable the interoperability of IoT devices and to annotate their functional and nonfunctional properties, including security and privacy. In this paper, we will show how to use the ontology and JSON-LD to annotate connectivity, security and privacy properties of IoT devices. Out of that, we will present our prototype for a lightweight, secure application level protocol...
Passwords are still the predominant mode of authentication in contemporary information systems, despite a long list of problems associated with their insecurity. Their primary advantage is the ease of use and the price of implementation, compared to other systems of authentication (e.g. two-factor, biometry, …). In this paper we present an analysis of passwords used by students of one of universities...
Honeypots are used as a security measure both to divert the attention of a potential attackers intentions and to reveal the attacker since the only reason someone would interact with honeypots is if they are looking for a vulnerable target. Honeypots emulate only a part of the machine they are supposed to represent and contain no valuable data. ICS (Industrial Control System) is a term that is used...
Captology is an acronym, derived from Computer As Persuasive TechnOLOGY, where the instance persuasive, (lat. persuasibilibus - enticing), refers to the convincing persuasion caused by computer technology. Transitive and interactive technologies as intelligent systems, have imposed, by their persuasivity, “the cult of information”, after which the information became type of goods that as utilitarian...
Although the protection of ownership and the prevention of unauthorized manipulation of digital images becomes an important concern, there is also a big issue of image source origin authentication. This paper proposes a procedure for the identification of the image source and content by using the Public Key Cryptography Signature (PKCS). The procedure is based on the PKCS watermarking of the images...
In this paper, we analyze the accomplishment of a study for a low cost system, named PicoAgri, to monitor the status of agricultural fields. We here deal with the small detection system we are developing representing the first element to build the final PicoAgri concept: a system consisting of two elements, an array of small satellites coupled to drones. The array of CubeSat small satellites will...
As a particular type of artificial neural networks, self-organizing maps (SOMs) are trained using an unsupervised, competitive learning to produce a low-dimensional, discretized representation of the input space of the training samples, called a feature map. Such a map retains principle features of the input data. Self-organizing maps are known for its clustering, visualization and classification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.