The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Location is at center of the most exciting and innovative technologies emerging today. Along with traditional applications, GIS is fundamental to the Internet of Things (IoT), autonomous vehicles, social media analysis, and the sharing economy. Leveraging hardware, software, cloud computing, big data and analytics, these technologies involves a broad spectrum of expertise including software development,...
The internet nowadays has become more interactive than ever since; many websites and web applications provide real-time information and notifications of what happening at the time, such service can be provided based on subscription as in Facebook and Twitter. Many techniques and web tools are used to insure the real-time functionality when designing web applications; the client-server communication...
Continuous monitoring of an individual's health using wearable biomedical devices is becoming a norm these days with a large number of wearable kits becoming easily available. Modern wearable health monitoring devices have become easily available in the consumer market, however, real-time analyses and prediction along with alerts and alarms about a health hazard are not adequately addressed in such...
This paper presents a modified Petri nets simulation algorithm applied as an engine for a logic simulator in digital integrated circuit design. The simulator uses an event-driven algorithm and eliminates the delta delay which occurs in the majority of modern simulation algorithms. The algorithm has been tested for the logic simulation of combinational digital circuits and demonstrated more accurate...
In this publication a novel concept for M2M service platform architecture is presented enabling decentralised and autonomous M2M application service provision. This publication introduces the functional architecture of the approach and describes the system structure and application creation process. Additionally several M2M service platforms are evaluated regarding requirements necessary for decentralised...
In this paper, we describe an approach to uncover and visualize relationships along entities in Wikipedia-pages. We define different distance metrics between Wikipedia articles, based on the link structure. A prototype was implemented, which allows the specification of arbitrary Wikipedia entities with the help of an auto-completion mechanism and the detection of paths with different characteristics...
This publication proposes a novel testing framework for the functional verification of decentralised services and applications in Peer-to-Peer (P2P)-connected Machine-to-Machine (M2M) networks. Besides presented challenges and requirements for testing within distributed environments, a concept for deriving and generating test cases based on a Test Description Language (TDL)-based approach is described...
Aircraft propeller performance is significantly reduced when tip speeds become sonic causing the maximum attainable airspeed of the vehicle to be limited by the propeller diameter. There are also performance losses attributable to miniature Unmanned Aerial Vehicles as the propeller to hub diameter ratio is reduced. The research conducted indicated that re-arranging a Brushless DC Motor and propeller...
The Internet facilitates nowadays interaction and collaboration between persons located at very long distances from each other. It also facilitates interactions between software systems located at great distances. The key concept is the identification of the subject involved in the interaction. It is necessary to validate whether the person performing certain activities on a software system is the...
This paper proposes an approach for addressing Resource Description Framework (RDF) knowledge representation limitations using an emergent graph model. The metagraph model is proposed to solve this problem. The formal definition of the metagraph model is given. Metagraph and hypergraph models are compared and it is shown that the hypergraph model does not implement the emergence principle. Textual...
This work describes an investigation of formal grammar with application to text mining. It is an important area since text is the most widespread type of data and it contains a lot of potentially useful information. Unstructured nature of text requires other methods for its processing, in contrast to other types of data mining. In this work, the authors propose an original approach to text mining...
P2P-based M2M application frameworks have several advantages, such as increased flexibility, efficiency and a lack of single point of failure as compared to centralised approaches. However, there are several security drawbacks which need to be addressed in order to provide the user a secure environment for the provision and usage of M2M applications. This publication presents different security issues...
This article is about study of honeypots. In this work, we use some honeypot sensors deployment and analysis to identify, currently, what are the main attacks and security breaches explored by attackers to compromise systems. For example, a common server or service exposed to the Internet can receive a million of hits per day, but sometimes would not be easy to identify the difference between legitimate...
The evolution towards mobile networks flat architecture entreat a key-role for IP mobility management in providing the ubiquitous always-on network access services. This paper provides prospects for efficient mobility management in SDN plus mobile network architecture and describe important call control flows in inter system handover scenario. Distribution of gateway function approach has been followed...
Implementing Cloud Computing technologies requires strategic planning by decision-makers to avoid the risks of adoption, and to gain full competitive advantage. Adopting Cloud Computing is a decision-making process that raises a number of critical issues for organisational management. This paper presents an Holistic Strategic Assessment approach that covers the five main contexts of organisations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.