The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new framework for anomaly detection when collectively monitoring many complex systems. The prerequisite for condition-based monitoring in industrial applications is the capability of (1) capturing multiple operational states, (2) managing many similar but different assets, and (3) providing insights into the internal relationship of the variables. To meet these criteria, we propose...
Research in the area of internet-of-things, cyberphysical-systems, and smart health often employ sensor systems at residences for continuous monitoring. Such research-oriented residential monitoring systems (RRMSs) usually face two major challenges, long-term reliable operation management and validation of system functionality with minimal human effort. Targeting these two challenges, this paper describes...
An educational incubator in Purdue University's Polytechnic Institute has been experimenting with highly integrated methods to facilitate, assess, and evaluate student learning. Comprised of transdisciplinary faculty and students, one of the basic covenants is to intentionally and repeatedly balance Humanities and STEM concepts by way of open-ended problems affecting humanity and the planet. The learning...
Accurate detection of cyber-attacks plays a central role in safeguarding computer networks and information systems. This paper addresses the problem of detecting SYN flood attacks, which are the most popular Denial of Service (DoS) attacks. Here, we compare the detection capacity of three commonly monitoring charts namely, a Shewhart chart, a Cumulative Sum (CUSUM) control chart and exponentially...
Morphological computation (MC) has revolutionized robotic systems employing morphological properties (MP). Thus far, morphology has been mostly used to analyze morphological functionalities qualitatively after design phase of robotic systems. Furthermore, morphology has verified qualitative requirements, not modeled quantitative specifications. To fill this gap, we present a distributed algorithm...
The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the wave of Information-Centric Networking. Although the NDN's data-plane seems to offer many advantages, e.g., native support for multicast communications and flow balance, it also makes the network infrastructure vulnerable to a specific DDoS attack, the Interest Flooding Attack (IFA). In IFAs, a botnet issuing unsatisfiable...
The high failure and dropout in programming courses all over the world is around 30%. The Bachelor of Information and Communications Technology of the Federal University of Santa Catarina has failure rates up to 80% in recent years. Although there are several studies around this topic, a few of them discuss the academic tutoring for these courses. The concern with the student dropout is a major challenge...
Nonintrusive monitoring is a powerful tool to increase the quality, reliability, and efficiency of power electronics systems. In recent years, the use of intelligent systems to perform this type of tasks has been increased due to its high capacity to correctly predict the values of the parameters under monitoring. Support Vector Machines (SVM) is a supervised learning method that maps input data into...
There are several evidence of magnetic field alterations that have been registered instants before seismic activity, in different parts of the world. Under the hypothesis that there is a relation between both phenomena, a multiple disciplinary project is being developed for verifying this statement. In this paper, a prototype for a data acquisition system is presented for obtaining valuable information...
Crowd-based requirements engineering (CrowdRE) is promising to derive requirements by gathering and analyzing information from the crowd. Setting up CrowdRE in practice seems challenging, although first solutions to support CrowdRE exist. In this paper, we report on a German software company's experience on crowd involvement by using feedback communication channels and a monitoring solution for user-event...
Because data collection in HPC systems happens on the nodes and is easily related to the job running on the node, tools presenting the data and subsequent analyses to the user generally present them at the job level. Our position is that this is the wrong level of abstraction and thus limits the value of the analyses, often dissuading users from using any of the offered tools. In this paper we present...
In MapReduce, the parallel processing performance is often limited by only a few compute nodes that delay to complete given tasks. Although various techniques have been invented to handle such stragglers, these techniques mostly impose a burden on master node to monitor the progress of all the compute nodes, resulting in a new bottleneck as the number of compute nodes increases. As an alternative...
Energy fuels the growth and development of any country, and as such effective monitoring, measurement, billing and access control is imperative. This paper presents a device that uses the evolving Internet of Things (IoT) technology in the design and implementation of an Internet based prepaid energy meter often referred to as smart meters. The energy measurement and billing system is automated. The...
The problems of creating complex IT on the example of distributed information systems are considered. Also there was reviewed the structure of processes for elements interaction while creating such systems. Proposed an model of change impact on project elements in complex projects management and was suggested an approach to configuration management of such projects, that makes it possible to build...
For the WSNs lifetime optimization, the non-disjoint set covers (NDSC) based coverage control approach has brought out a better performance. In addition, it yields a promising indicators in term of reliability, resilience and the possibility to be used for heterogeneous WSNs. This paper addresses the WSNs resiliency assessment via NDSC approaches to WSNs lifetime optimization. We investigated the...
Nowadays, providing a security system for houses has become a vital research in which the latest technologies are being adopted to serve this purpose. Wireless network is one of the technologies that have been used to provide remote monitor and control for the home appliances. This paper aims to propose a security door lock system based on Raspberry pi technology where cameras, keypad and pi-lids...
In this paper we consider the problem of filming sport events, ensuring high quality image transmission to the spectators. A fleet of drones is used to cover the area in which the play takes place and to track all events. Auxiliary drones are used to support filming drones in order to transmit high quality image to the disadvantaged spectators with respect to the event that takes place in a certain...
Software Defined Networking (SDN) is a new networking paradigm which provides better decoupling between control plane and data plane. The separation not only allows OpenFlow (OF) switches in the data plane simply to forward data, but also enables the centralized programmable controller to control the behavior of entire network. SDN makes it possible to manage the network more flexible and simple....
The idea of controller performance assessment is becoming very important in the process control area. One of the main performance monitoring index is based on the minimum variance control benchmark proposed by Harris. However, the low value of this index means only low performance of the controller. So, it is difficult to tune the controlled parameters based on this index. This paper considers the...
Environmental emergencies early warning and response, such as floods, forest fires, volcanic eruptions, etc., are one of the areas where space information can be very useful. For this reason the Argentinean Space Plan includes a chapter, called Space Information Cycle, completely dedicated to emergencies. In this framework, CONAE, the Argentinean Space Agency has a work team specifically aimed at...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.