The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this era of depleting fossil fuels and global warming, alternative sources of energy are critical to mankind's survival, making its study imperative for energy engineering students. This work demonstrates the design, development and implementation of a remote triggered experiment to analyze wind data and correlate it with Weibull and Rayleigh distributions performed in coastal Kerala, in southwest...
A tracking simulator is an online simulation system that utilizes dynamic parameter estimation for calibrating model parameters to achieve state synchronization with the process. It can be utilized as a plant-wide virtual sensors or as a predictive tool to provide production forecasts based on the current state of the plant. The appearance of industrial applications based on tracking simulators has...
This paper presents a multi-layer distributed performance management model for Internet of Things (IoT) as a service for caregivers. Performance monitoring and control of IoT devices and services are vital functions for e-health systems. Cloud-based IoT systems with centralized data centers further underline the need for distributed management. The main contribution of this paper is a model and prototype...
Distributed Denial of Service (DDoS) attack has been bringing serious security concerns on banks, finance incorporation, public institutions, and data centers. Also, the emerging wave of Internet of Things (IoT) raises new concerns on the smart devices. Software Defined Networking (SDN) and Network Functions Virtualization (NFV) have provided a new paradigm for network security. In this paper, we...
Making the data plane of a SDN flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable for Software Defined IoT (SD-IoT) networking. The network device having programmable data plane provides an ability to add new packet and data processing procedures dynamically to the IoT applications. Previously proposed solutions for adding programmability to the...
In the recent years, we have observed the development of several connected and mobile devices intended for daily use. This development has come with many risks that might not be perceived by the users. These threats are compromising when an unauthorized entity has access to private big data generated through the user objects in the Internet of Things. In the literature, many solutions have been proposed...
Energy efficient control of server rooms in modern data centers can help reducing the energy usage of this fast growing industry. Efficient control, however, cannot be achieved without: i) continuously monitoring in real-time the behavior of the basic thermal nodes within these infrastructures, i.e., the servers; ii) analyzing the acquired data to model the thermal dynamics within the data center...
System identification is a powerful technique for building accurate mathematical models of complex systems from experimental input/output data. Mathematical models that predict the behavior of the column are highly useful to improve the working conditions of distillation columns and increase throughput or lower energy consumption. This paper models a pseudo binary distillation column using a black-box...
A large portion of data mining and analytic services use modern machine learning techniques, such as deep learning. The state-of-the-art results by deep learning come at the price of an intensive use of computing resources. The leading frameworks (e.g., TensorFlow) are executed on GPUs or on high-end servers in datacenters. On the other end, there is a proliferation of personal devices with possibly...
Anomaly detection is the process of identifying unusual signals in a set of observations. This is a vital task in a variety of fields including cybersecurity and the battlefield. In many scenarios, observations are gathered from a set of distributed mobile or small form factor devices. Traditionally, the observations are sent to centralized servers where large-scale systems perform analytics on the...
Online transaction failures often show up as "500: Internal Server Error" in web server access logs. In many instances determining the root cause of the failure is a difficult task. It could either be a bug associated with a specific HTTP request alone or the result of an undesirable state created by previous HTTP transactions. The latter case, which we call workload dependent faults, are...
Model slicers are tools which provide two services: (a) finding parts of interest in a model and (b) displaying these parts somehow or extract these parts as a new, autonomous model, which is referred to as slice or sub-model. This paper focuses on the creation of editable slices, which can be processed by model editors, analysis tools, model management tools etc. Slices are useful if, e.g., only...
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
Recent advances in the Internet-of-Things has given rise to the possibility of connecting different kinds of devices to the internet. With low computing resources constraining most IoT devices and their networks, managing the capabilities and services of the various constrained devices over the internet has been an issue for IoT implementations. Existing approaches to this problem lack end-to-end...
This paper describes a dynamical nonlinear data center model. It is a principle-based continuous time model, aimed at testing and evaluating control and optimization algorithms. The model is based on a module in data center used by RISE, Research Institute of Sweden. The data center modelled is a small scale slab floor data center. It contains four computer-room-air-handling units, two rows of five...
This paper proposes a simulated model of micro-grid control system based on IEC61850 standardized information network. In the model process level, a micro grid consisting of 2 DGs and 4 feeders is simulated by a C program generated from a Simulink Coder. In the model bay level and station level, IEC61850 communication infrastructure is simulated to include intelligent electronic devices server and...
The paper presents the Big data definition and the main characteristics description The model of association between entities and characteristics is constructed. The method of heterogeneous data sharing and bringing to relational data model “entity-characteristic” was created. The testing results of developed methods and algorithms are presented.
Structure of the control system for passenger traffic registration in public transport of “smart” city, which is based on a modular principle, was built. Description and function of the main components in the structural diagram of the system are presented. Step-by-step algorithm of the control system for passenger traffic registration in public transport of “smart” city with specific explanation of...
Internet of vehicles (IoVs) emerges as a promising technology to facilitate vehicular wireless communication by approving vehicle-to-everything (V2X) services for intelligent transportation systems including vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I) and vehicle-to-pedestrian (V2P) services. V2V networks have been rapidly developed to support short distance data transmission among vehicles...
Health issues are rising progressively due to the ignorance of health monitoring on regular basis which can now be looked after by the fast growing communication technologies and smart devices. In this paper, a robust healthcare model is proposed for continuous monitoring of the patient even when the patient is traveling. Sensitive data is collected from the Internet of Things (IoT) sensors connected...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.