The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of civilization into urban areas, agriculture has been forced to adapt to less space and limited resources. Developments in urban farming and robotics have produced the personal food computer, a device producing a controlled environment for hydroponic plant growth. As many pharmaceuticals originate from chemicals found in plants, investigation of chemicals relevant to human health...
Remote access Trojans (RATs) are used by attackers to compromise and control the victim machine. In this work, a novel Network-based framework is introduced for detecting RAT bots based on data mining techniques. Several machine learning (ML) techniques are used to differentiate between benign and RAT infected machines. Various performance measurements are used to evaluate the performance of the proposed...
Buildings represent 40% of total primary energy use in the U.S., and researchers have recognized the necessity of making office spaces more energy efficient. To reduce energy consumption, it is important to take into account buildings occupants' behavior into account. The difference between simulated, estimated and real power consumption in buildings reflects the need to search for more accurate ways...
The human immune system is incredibly efficient at identifying self- and non-self entities in our bodies. A non-self entity (malicious), once identified, is attacked by particular types of cells to remove the intruder before it can cause damage. Our immune system has components that identify not only non-self entities but also recall old entities that may not have been encountered for a very long...
Increased interest in security has resulted in greater demand for automated test systems to comply with security standards. Automated test systems have traditionally been operated in isolated environments because of their unique characteristics. However, changes in United States defense acquisition regulations require that defense contractors bring these test systems into compliance with National...
A majority-dynamic method of reconfiguring the on-board computer system in the time slot required for the control and diagnostics system performance is described. The described method provides fault tolerance of multiprocessor supercomputer rack in accordance with the concept of the integration of on-board equipment IMA. Using the control automat with implemented algorithm of self-diagnostic makes...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
Probing is a technique used for network monitoring and measurement applications, including detection of silent failures and performance analysis to verify compliance with service-level agreements. Many existing approaches to probing-path selection seek to minimize the number of probes (an NP-hard problem) or to minimize probing delay, but they fail to properly assess the network overhead imposed by...
Diabetes management is a complex and a sensible problem as each diabetic is a unique case with particular needs. The optimal solution would be a constant monitoring of the diabetic's values and automatically acting accordingly. We propose an approach that guides the user and analyses the data gathered to give individual advice. By using data mining algorithms and methods, we uncover hidden behaviour...
Information-Centric Networking (ICN) has emerged as an interesting approach to overcome many of the limitations of legacy IP-based networks. However, the drastic changes to legacy infrastructure required to realise an ICN have significantly hindered its adoption by network operators. As a result, alternative deployment strategies are investigated, with Software-Defined Networking (SDN) arising as...
The emergence of personal and other low-cost health devices opened new perspectives for expanding and improving access to health care, with a potentially huge societal impact. We developed a modular and reconfigurable Health Kiosk based on such devices, where users can autonomously measure vital signs for screening or continued monitoring. However, achieving truly free use even by segments of the...
We are currently witnessing an evolution towards network virtualization and Software Defined Networking (SDN) paradigm. SDN permits the decoupling of the control and data planes of traditional networks, and offers flexible and programmable networks. Besides, the need for dynamic provisioning and composition of networking services leads to the deployment of software components on virtualized network...
A Distributed File System (DFS) is a system where the files are stored and distributed on different computers connected via a communication network. The FlexA is a DFS integrated into the user space with fault tolerance, security, scalability and flexibility features. However, FlexA has limitations in the development of new resources to the system. This work made the reengineering of the FlexA aspects...
With the rapid development of cloud computing, thousands of servers and various cloud applications are involved in data center. These changes result in more and more complex flows in data center, which motivates the need for faster, lower overhead, more scalable large flow detection technology. This paper firstly shows the shortcomings of the traditional large flow detection technologies. Then it...
Aiming at the defects of traditional manual operation and wiring of the traditional lighting system, this paper puts forward a design scheme of LED lighting control system based on ZigBee wireless sensor network technology. With the change of the environment parameters and the preset lighting mode, the system can respond quickly and automatically, and realize the PWM linear non-polar dimming. Based...
Along with people's demand for crop diversity and the greenhouse development, the greenhouse monitoring system becomes very important for making the crops grow better. In this paper, the SCM based on MSP430F149 is designed as the master control unit, CC2530 is designed as the greenhouse data collection system of the data collection unit, and the configuration software is also combined to monitor the...
Parking in modern world is always a subject of concern and isn't a task to be ignored as it was in old days. With modernization and introduction of digital devices, machines have taken a very important and irreplaceable role in human life. Parking nowadays is also done with the help of much advanced and sophisticated systems. The problem with most of these system is that they need a very high capital...
Today the technology advancement in communication technology permits a malware author to introduce code obfuscation technique, for example, Application Programming Interface (API) hook, to make detecting the footprints of their code more difficult. A signature-based model such as Antivirus software is not effective against such attacks. In this paper, an API graph-based model is proposed with the...
Smart home is a house that uses Internet of Things(IoT) to monitor the environment, control the electric appliances and communicate with the outer world. Smart home is a complex technology, but a developing one. A smart home automation system has been developed primarily because in today's time and world, everybody's in a surge and wishes to screen and get to everything without being there physically...
Distribution grid dynamics are becoming increasingly complex due to the transition of these networks from passive to active networks. This transition requires increasing the observability and awareness of the interactions between Transmission and Distribution (T&D) grids, particularly to guarantee adequate operational security. As part of the work carried out in the EU-funded IDE4L project, a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.