The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Test Automation Platform©1 (TAP) is a software system that developers can use to test their own hardware or software (or combinations of both). Developers create TAP test plans by combining and configuring individual test steps in a GUI. Developers can also develop their own test steps with .NET to better suit their needs. Since (manual) programming is always prone to errors, TAP users need...
Facial expression recognition is a very important research field to understand human emotions. Many facial expression recognition systems have been proposed in the literature over the years. Some of these methods use neural network approaches with deep architectures to address the problem. Although it seems that the facial expression recognition problem has been solved, there is a large difference...
With the rapid development of the Internet, especially in recent years, the development of mobile Internet is increasingly rapid. Message push, which is an important way for mobile client to publish information and make communication, plays a significant role in mobile Internet. MQTT protocol is one of the implementation technologies of message push in Android system with low power consumption and...
There is an increasing availability of high throughput networks which leads to the need of security appliances in these networks. Testing these appliances with regards to performance and effectiveness relies on testing tools that can achieve or even surpass the capabilities of the devices and networks under test. However, current tools are not capable of achieving both the flexibility and performance...
Ad-Hoc and Delay-Tolerant Networks (AHDTNs) can be very useful in environments where more traditional networking technologies fail. Determining the practical effectiveness of AHDTNs can however be challenging. We review design considerations and practical experience with a novel mechanism for monitoring and analyzing the performance of AHDTNs. This new mechanism, AllNet Trace, somewhat resembles a...
Upper limb disorders may impair the use of control interfaces for Electric Powered Wheelchairs (EPW), such as joysticks, for many individuals with disabilities. The aims of this study were to develop and test a virtual wheelchair driving environment that can provide quantifiable measures of driving ability, offer driver training, and measure the performance of alternative controls. This work introduces...
Hardware-in-the-Loop (HIL) is a well-established concept for developing and testing embedded systems. While it is widely used in industrial automation and the automotive area, it is rarely applied to Building Automation Systems (BAS). This work proposes the interconnection of a prominent building automation protocol, namely Building Automation and Control network (BACnet), and a simulator, PowerDEVS,...
In this paper the authors present the results of research to develop the visual system for autonomous flying agent. The core elements of the vision system which were designed and implemented in the earlier stage of the project are brought together. The second aim is to show capabilities of a simulation environment designed and developed by the authors in order to enable testing of the vision systems...
We propose a new method in rank level fusion for biometric identification. Our method is based on the pool adjacent violators (PAV) algorithm after the ranks have been transformed to the approximated scores. We then show that our method outperforms various approaches that commonly used in biometric rank level fusion on NIST BSSR1 multimodal database.
Being able to record and analyze data securely have a paramount importance to meet the needs of both military and civilian applications. Therefore, data acquisition systems are used to meet the needs of complex applications. A data acquisition system capable of data conversion, collection and transfer is described in this paper. This system is implemented on FPGA, because of high processing speed...
In this position paper, we define the SISSY challenge and explore what it might mean for the usual expected integrations and for the more difficult unexpected integrations.
A novel approach of a test environment for embedded networking nodes has been conceptualized and implemented. Its basis is the use of virtual nodes in a PC environment, where each node executes the original embedded code. Different nodes run in parallel, connected via so-called virtual channels. The environment allows to modifying the behavior of the virtual channels as well as the overall topology...
The paper presents a Finite State Machine (FSM) based approach for deriving tests with reduced complexity, under the White Box testing assumption where all the faulty implementations are explicitly enumerated. The specification and implementation FSMs are assumed to be initialized, i.e., each possibly partial and (non-observable) nondeterministic FSM has a reliable reset. The proposed technique is...
Process of detailed testing and verification of all automotive embedded software components generates detailed reports about each segment of tested electronic control units (ECU). The very first group of tests in this process is Acceptance tests, and one of the most important tests in this stage of testing and verification is interface check of the software component. The interface check must ensure...
It is of utmost importance for the future success of WebRTC to ensure that interoperability is operational between web browsers and any WebRTC-compliant client. To be guaranteed as operational and effective, interoperability must be tested extensively by establishing WebRTC data and media connections between different web browsers running on different devices and operating systems. We will present...
In this paper, an overview of a testing and simulation approach for a DTN protocol implementation (named µPCN) is provided. This implementation is intended to render low-cost world-wide satellite communication possible. It will be flighttested during the ESA OPS-SAT mission. To ensure its quality, a simulation environment has been developed used for testing its functionality in simulated LEO satellite...
The rising adaption of Internet of Things (IoT) and Industry 4.0 is expected to boost the demands of spatially distributed embedded wireless networks. For an efficient design flow of reliable wireless communication protocol implementations, it is essential to have a testing environment, which is continuous, simple and automated at various levels in the development life cycle. This paper presents an...
The existing communication technologies for IOT have become either saturated or do not meet actual needs, regarding long distances or low power consumption. We propose a study about mobility for the LoRa protocol, a new Low Power Wide Area Network technology. The paper draws upon a short overview of LoRa physical layer protocol, as well as on our testing design, some distances achieved and signal...
This publication presents a novel concept for securing P2P-based M2M applications using the integration of a trust management system. In addition, this publication presents different security problems inside the P2P-based M2M application (P2P4M2M) framework and evaluates P2P protocols based on security. Furthermore, this paper emphasises the importance of trust for ensuring security. This is done...
As wireless and telecommunicaton infrastructure communications have been integrated into modern vehicle systems (i.e., infotainment systems and vehicle to vehicle systems), the security implications on the relatively unchanged underlying network protocols inside the vehicles are investigated by researchers and industrial experts in the corresponding domain. Some researchers have achieved the investigation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.