The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present the design of an energy-saving wireless sensor network using ZigBee standard with tree network topology and the frequency band of 2.4 GHz. By choosing low power consumption components, modifying the MAC algorithm and AES cryptography, the proposed network allows users to utilize the power efficiently, provide high level of security and can be applied to a variety of applications.
In the actual GNSS space signal quality monitoring system, the performance of the channel is not ideal, resulting in the signal transmitted to the receiver is inconsistent with the signal received by the antenna. Studying the characteristics and designing the equalization algorithm of the channel could restore the received signal to the real state, which will ensure the quality monitoring results...
An approach is proposed to reasoning problems based on Petri nets (PNs). First, a method is presented modeling a world by describing Boolean variables as PN loops. Second, an algorithm is introduced to rearrange inference rules as conjunctive normal forms (CNFs), and, in turn, CNFs are transformed into linear constraints. Consequently, a knowledge base system (KBS) PN is obtained by designing monitor...
In the context of the Open Network Automation Platform (ONAP), we develop in this paper a resource allocation strategy for deploying Virtualized Network Functions (VNFs) on distributed data centers. For this purpose, we rely on a three-level data center hierarchy exploiting co-location facilities available within Main and Core Central Offices. We precisely propose an active VNFs' placement strategy,...
Cheetah flows, which are high-rate flows, can cause increased packet delays and losses in other flows. Leveraging the flexibility offered by the NFV paradigm, our proposed Cheetah Flow Identification Network Function (CFINF) uses a novel method in which a new measure, short-duration flight rate, which is the rate of a flight of packets received over a fixed (short) time interval, is computed and compared...
The accuracy provided by traditional sampling-based monitoring approaches, such as NetFlow, is increasingly being considered insufficient to meet the requirements of today's networks. By summarizing all traffic for specific statistics of interest, sketch-based alternatives have been shown to achieve higher levels of accuracy for the same cost. Existing switches, however, lack the necessary capability...
The ability to continuously detect the interesting subgraph patterns over dynamic graph-structured data in real time is crucial to many applications. Generally, the edges of such subgraphs have temporal relation. In this paper, the stream model is used to describe the dynamic graph, in which the edges are processed in chronological order. In order to reduce the intermediate results, we propose a topological...
The purpose of this study is to determine the sleep status of college students. 12 volunteers(mean ± SE: 22 ± 2 yr, 170 ± 10cm, 61 ± 16 kg) take part in the research. The sleep situation are got by the waistband sleep monitor system. The average heart rate of the whole night, the average breath rate of the whole night, bed time, get up time, onset latency, total sleep time are monitored. These important...
Coverage issue in directional sensor networks (DSNs) is different from traditional omni-directional wireless sensor networks (WSNs) due to the limited angle of view and adjustable working direction. This paper sets up a model of monitoring area and a model of sensing area according to the unique characteristics of directional sensor and then derives an optimization model for area coverage ratio maximization...
This report describes algorithms for financial bubbles detection in real time mode. The various theoretical and practical aspects of algorithms for monitoring financial indexes in order to detect bubbles are presented. A comparative analysis of the properties of algorithms based on the results of experiments is carried out.
The report is devoted to comparison of existing methods of detecting changes (structural breaks) in random processes designed to detect the appearance of bubbles in financial markets. The report considers and compares the estimates obtained by monitoring algorithms and posterior algorithms for the purpose of determining the existence and date of the “bubble”.
Real-time DataBase Management Systems (RTDBMS) have been considered as a promising means to manage data for data-centric automotive systems. During the design of an RTDBMS, one must carefully trade off data consistency and timeliness, in order to achieve an acceptable level of both properties. Previously, we have proposed a design process called DAGGERS to facilitate a systematic customization of...
Formal verification serves as the theoretical basis for the engineering task of correctness and performance (quality) assurance. State of the art model checking, automatic specification refinement and theorem proving are employed to tackle the often undecidable (as imposed by the halting problem) task of complete verification. In this paper we formalize, prove and demonstrate a new unobtrusive way...
Recently, 802.11ah with restricted access window for collision attenuation has been proposed for Internet of Things (IoT) applications. Random grouping of nodes in different access window is utilized to reduce the hidden node collision probability. However, when the coverage area of the sink node is large, the occurrence probability of hidden node problem is still high and severely impacts the system...
As the demand for structure healthy monitoring of civil engineering continues to grow at an unprecedented pace, the need for real time remote data compression and transmission systems becomes more prominent. In this paper, aiming at the problem of massive data transmission in the safety monitoring systems of the civil engineering applications, the GPRS wireless transmission terminal is designed to...
The scale of the modern city has been expanding, which leads to a lot of serious environmental pollution problems. Among them, the air pollution problem is the most prominent. In order to control the air pollution in urban cities, the government has deployed a lot of air pollutant monitoring equipment which produce massive multi-dimensional time series data. Through the motif discovery and analysis...
Nowadays, there are many serious cyber security threats such as viruses, worms and trojans but without a doubt botnets are one of the largest threats. Although there are numerous ways to discover botnets and mitigate their effects, most methods have problems effecting detection, due to their evasive characteristics. Also, the majority of previous research uses only one data source (e.g. network traffic),...
Swarm of drones are increasingly deployed to perform a variety of critical missions such as surveillance, rescue in disaster areas etc. To guarantee success of a mission, the controlling software should pursue two goals. Firstly, it should ensure safety, i.e., guarantee collision avoidance. Secondly, it should prevent a premature depletion of the batteries of the drones by minimizing their travel...
Industrial Cyber-physical systems (ICPSs) are expected to provide effective solutions for improving the operation of many existing industrial manufacturing systems. Wireless sensor networks in the industrial field is classified as low-power and lossy network due to energy constrained devices, the dynamic environment and a high packet loss rate. Energy efficiency and delivery reliability need to be...
In process monitoring of batch process, Fisher discriminant analysis is a very popular method and has be widely applied. In this paper, a new kernel local Fisher discriminant analysis (KLFDA) algorithm is proposed for fault diagnosis. The main contributions of the presented approach are as follows: 1) the proposed algorithm can simultaneously extract the global European distribution of data and local...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.