The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this study is to determine the sleep status of college students. 12 volunteers(mean ± SE: 22 ± 2 yr, 170 ± 10cm, 61 ± 16 kg) take part in the research. The sleep situation are got by the waistband sleep monitor system. The average heart rate of the whole night, the average breath rate of the whole night, bed time, get up time, onset latency, total sleep time are monitored. These important...
Cardiac output (CO) is the key indicator of the state of cardiac function. To realize noninvasive, continuous, portable, reproducible cardiac output monitoring, we design a cardiac output monitoring system based on photoplethysmography(PPG) which is stable, non-invasive and convenient to collect. K-calibration algorithm is used in the software part of this system. The main idea of K-calibration algorithm...
Bursts of abnormally high use of resources are thought to be an indirect cause of failures in large cluster systems, but little work has systematically investigated the role of high resource usage on system failures, largely due to the lack of a comprehensive resource monitoring tool which resolves resource use by job and node. The recently developed TACC_Stats resource use monitor provides the required...
Multi-band, multi-service and multi-modulation are new trends of GNSS development. Since novel modulation types like BOC/MBOC and multiplex techniques like (POCET, Interplex) of navigation signals have been utilized [1], the composite navigation performance is indeed improved. However, new challenges have arisen in the navigation signal quality monitoring area. Generally, common standard instruments,...
The worldwide prevalence of obesity is considered as a serious issue because obesity is one of the main causes of diabetes, heart disease, and cancer. Obesity is associated with various habits of our daily life, e.g. short sleep duration, high alcohol intake, and nonparticipation in physical exercise. Therefore, changing these habits in order to reduce body weight is recognized as an effective solution...
With the widespread use of information, variety of security logs have increased greatly, which due need for security log management. Organizations requirements have imposed to collect, store, and analyze tremendous volumes of log data across entire infrastructure for extended durations and at increasingly granular levels. It is the process of generating, transmitting, storing, analyzing, and disposing...
In this paper authors present a new open source SNMP manager application called SETH. This application includes the following major attributes over existing management tools: MIB file parsing capabilities, automatic discovery of network topology and variable up to real-time probing frequency of network equipment in order to extract useful statistical information regarding network conditions. Network...
As the problem of the food safety is appearing, the development of food cold-chain has been gradually emphasized. Making the trade of food cold-chain in Henan as the object, this paper does a research about the current situations and the logistics management problems of food cold-chain in the operation. The conclusions will support the decision of how to develop the food cold-chain logistics and industry...
This work presents a generic Intrusion Detection and Diagnosis System, which implements a comprehensive alert correlation workflow for detection and diagnosis of complex intrusion scenarios in Large scale Complex Critical Infrastructures. The on-line detection and diagnosis process is based on an hybrid and hierarchical approach, which allows to detect intrusion scenarios by collecting diverse information...
Hotspots in data center have been attributed to an increase in equipment failures, which causes system down time and business loss. In maintenance of IT equipment, removing hotspot with minimal cooling power cost is both ecological and financial benefits. Thus, identifying root cause of hotspots in data center is essential. A variety of factors can cause the issue, and therefore, diagnosing root cause...
Previous distributed anomaly detection efforts have operated on summary statistics gathered from each node. This has the advantage that the audit trail is limited in size since event sets can be succinctly represented. While this minimizes the bandwidth consumed and helps scale the detection to a large number of nodes, it limits the infrastructure's ability to identify the source of anomalies. We...
In this paper, a novel Bot detection algorithm for Windows system based on API call correlation was proposed. the coefficient of product-moment correlation was utilized to calculate the correlation of different API calls. More other activities were correlated as well as keylogging. According to the characteristics of different Bot activities with API calls, the membership of different activities were...
High speed machining technology is used in a broad range of applications to machine ferrous metals and nonmetallic material. Based on its application, a motorized high speed, high power/torque spindle is the key technology that drives high speed machining. Performance monitoring determines if the equipment is operating as expected. This paper presents a new motorized spindle performance monitoring...
Large-scale IP networks present special challenges to security. Such networks consist of a large number of devices with a vast variety of traffic behavior. Finding a suitable line-up for the intrusion detection and monitoring mechanism is challenging. In this paper, we study the Snort and Bro-IDS systems. We have built a test platform, where we put those two detection systems side by side and compare...
As a kind of invisible spyware that records user's keystrokes, software keyloggers have posed a great threat to user privacy and security. It is difficult to detect keyloggers because they run in a hidden mode. In this paper, an immune-inspired dendritic cell algorithm (DCA) was used to detect the existence of keyloggers on an infected host machine. The basis of the detection is facilitated through...
Server consolidation and virtualization technology are used in modern data center as a method to improve the server utilization rate by encouraging the sharing of physical resources between virtual machines (VM). Although, this can be realized by plenty of virtualization softwares available in markets, creating a good management policy for the server consolidation environment is still a challenging...
In the application system, obtaining the information of the system at runtime and analyzing them are important for system adjustment. Many runtime metrics can be collected from software systems, and some statistical relationships exist among these metrics. Extracting the information of these metrics from the monitoring data and then analyzing the relationships between these metrics is an effective...
Integrity assessment plays a critical role in the security and regulatory certification of software-defined radio (SDR) and cognitive radio (CR). We propose a novel approach to assess the execution status of SDR and CR by monitoring their dynamic power consumption. The approach relies on extracting distinctive power consumption signatures, or fingerprints, and then using pattern recognition techniques...
Analyzed here is a fault localization approach based on directed graph in view point of business software. The fault propagation model solved the problem of obtaining the dependency relationship of faults and symptoms semi-automatically. The main idea includes: get the deployment graph of managed business from the topography of network and software environment; generate the adjacency matrix of the...
The purpose of this paper was to investigate Chinese learners' behaviors in self-regulated computer-assisted language learning environments in order to shed light on the role of the teacher in such environments. Fifty-one students from a metropolitan city in North China were surveyed regarding their learning behaviors in a two-year English listening learning program at a self-access language learning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.