Results (144)
Search Parameters:
Keyword: MonitorSupporting Active Aging Through A Home Automation Infrastructure for Social Internet of Things
The number of smart devices inside the living environments grows more and more every day, and with it the need to interface them in order to share data and activate functions. Each day, new scenarios and new applications emerge to make our lives easier in many different contexts. The AAL SOCIALIZE project aims to create…
Read MoreAutomating Hostel Telephone Systems
Residential schools can be a great place for students to learn and develop a different set of skills if the right environment is given to the child. Constant communication with parents can help the child to stay motivated and feel comfortable away from home, hence schools tend to provide various solutions to allow the student…
Read MoreAn Overview of Data Center Metrics and a Novel Approach for a New Family of Metrics
Data centers’ mission critical nature, significant power consumption, and increasing reliance on them for digital information, have created an urgent need to monitor and adequately manage these facilities. Metrics are a key part of this effort as their indicators raise flags that lead to optimization of resource utilization. A thorough review of existing data center…
Read MoreSignal-Based Metamodels for Predictive Reliability Analysis and Virtual Testing
In the current industrial development, an increasing number of sensors is applied for monitoring of any kind of appliances and machines. A predictive mathematical model allows for realistic assessment of the health state of the appliance, indication of service requirements, as well as control of the appliance, serving as so-called digital twin on a control…
Read MoreVirtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment
In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…
Read MoreFlexible lengthening-shortening arm mechanism for fishery resource management
The goal of this study was to use underwater robots instead of a diver’s observations to monitor and record the condition of an obstructed seabed in a shallow area. It is difficult to investigate marine resources that exist in deep water shaded by rock due to large and/or small rocks on the seabed. To solve…
Read MoreModeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber
The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…
Read MoreCall Arrival Rate Prediction and Blocking Probability Estimation for Infrastructure based Mobile Cognitive Radio Personal Area Network
The Cognitive Radio usage has been estimated as non-emergency service with low volume traffic. Present work proposes an infrastructure based Cognitive Radio network and probability of success of CR traffic in licensed band. The Cognitive Radio nodes will form cluster. The cluster nodes will communicate on Industrial, Scientific and Medical band using IPv6 over Low-Power…
Read MoreGroup of UAVs Moving on Smooth Control Law with Fixed Obstacles
In this paper considered the movement of multi-agent system that consists of several UAVs that carry out monitoring ground surface. The multi-agent system includes a lead agent and several agents-members of the group. The motion of this system occurs along a trajectory, which is determined by the initial conditions, its mathematical model and obstacles on…
Read MoreOptimal Plant Growth in Smart Farm Hydroponics System using the Integration of Wireless Sensor Networks into Internet of Things
Greenhouse cultivation is easy to keep up and control important factors such as light, temperature, and humidity. Using of sensors and actuators in the greenhouse to capture different values allows for the control of the equipment, it can also be optimized for growth at optimal temperature and humidity of various crops planted. We use wireless…
Read MoreSystem Control Device Electronics Smart Home Using Neural Networks
The use of information technology is very useful for today’s life and the next, where the human facilitated in doing a variety of activities in the life day to day. By the development of the existing allows people no longer do a job with difficulty. For that, it takes a system safety home using system…
Read MoreDevelopment of an automated vehicle stop system for cardiac emergencies
This paper describes the concept and configuration of a novel automated safety vehicle stop system, and a future prospect of the study. Intrinsic sudden death may cause traffic accident since such accidents sometimes involve not only the driver but also other traffic users such as passengers and pedestrians. Cardiovascular disease (CVD) is considered as a…
Read MoreFAG – a management support tool with BI techniques to assist teachers in the virtual learning environment Moodle
One of the great challenges in distance-learning is to follow the actions of the teachers/tutors and also the actions of students during the process of teaching and learning. This article presents the FAG Tool integrated with the LMS Moodle was developed to help managers of the Distance Education environment to monitor the actions of teachers/tutors…
Read MoreVerifying the Detection Results of Impersonation Attacks in Service Clouds
A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…
Read MoreA security approach based on honeypots: Protecting Online Social network from malicious profiles
In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…
Read MoreApplications of Case Based Organizational Memory Supported by the PAbMM Architecture
In the aim to manage and retrieve the organizational knowledge, in the last years numerous proposals of models and tools for knowledge management and knowledge representation have arisen. However, most of them store knowledge in a non-structured or semi-structured way, hindering the semantic and automatic processing of this knowledge. In this paper we present a…
Read MoreSemantic modeling of portfolio assessment in e-learning environment
In learning environment, portfolio is used as a tool to keep track of learner’s progress. Particularly, when it comes to e-learning, continuous assessment allows greater customization and efficiency in learning process and prevents students lost interest in their study. Also, each student has his own characteristics and learning skills that must be taken into account…
Read MoreFenceBook a Geofencing based Advertisements Application Using Android
Geo-fencing (geofencing) is a great feature in a software program that uses Global Positioning System (GPS) or radio frequency identification (RFID) to define the geographical boundaries feature. Actually geofence is a virtual barrier. Geofencing is an innovative technology, an online marketplace for proactive contextual services that allows users to easily find interesting services, can easily…
Read MoreRobust µController Implementations for a Linear Pneumatic Actuator Interaction
Over the years, pneumatic systems have recorded a remarkable performance in automated applications, based on their cost to efficiency ratio and ease of energy transmission. Therefore, their drawback of not being totally controllable devices in terms of position accuracy, still represents a challenge task for engineers. In this paper, a traditional three term controller (PID)…
Read More
