Journal articles on the topic 'ISO (Computer network standard)'

To see the other types of publications on this topic, follow the link: ISO (Computer network standard).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'ISO (Computer network standard).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Smura, Edwin J., Barbara Beeton, Karla Savage, and Alan Griffee. "Font information interchange standard ISO/IEC 9541." Computer Communications 12, no. 2 (April 1989): 93–96. http://dx.doi.org/10.1016/0140-3664(89)90063-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Anel Tanovic, Samir Ribic, and Zvjezdan Sehovac. "New performed model of ISO/IEC 20000 standard." International Journal of Digital Content Technology and its Applications 7, no. 10 (June 30, 2013): 80–94. http://dx.doi.org/10.4156/jdcta.vol7.issue10.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lazarevska, Marijana, Meri Cvetkovska, Miloš Knežević, Ana Trombeva Gavriloska, Milivoje Milanovic, Vera Murgul, and Nikolay Vatin. "Neural Network Prognostic Model for Predicting the Fire Resistance of Eccentrically Loaded RC Columns." Applied Mechanics and Materials 627 (September 2014): 276–82. http://dx.doi.org/10.4028/www.scientific.net/amm.627.276.

Full text
Abstract:
Using the concept of the artificial neural networks and the results of the performed numerical analyses as input parameters, the prediction model for defining the fire resistance of RC columns incorporated in walls and exposed to standard fire from one side, has been made. A short description of the numerical analyses of columns exposed to standard fire ISO 834, conducted by the computer software FIRE are presented in this paper. The software is capable of predicting the nonlinear response of reinforced concrete elements and plane frame structures subjected to fire loading, carrying out the nonlinear transient heat flow analysis and nonlinear stress-strain response associated with fire.
APA, Harvard, Vancouver, ISO, and other styles
4

L. Calpito, Jomar, Paul L. Olanday, and Alain C. Gallarde. "Application of advanced encryption standard in the computer or handheld online year-round registration system." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (August 1, 2022): 922. http://dx.doi.org/10.11591/ijeecs.v27.i2.pp922-935.

Full text
Abstract:
<span lang="EN-US">With various severe security threats for web applications, ensuring security on the database layer itself is imperative. Hence, this study aims to protect data saved on the computer or handheld online year-round (CHOY) registration system using the advanced encryption standard (AES) to strengthen data security within the app so that even potential attackers gain access to the app's database; they cannot obtain valuable information because it is scrambled and unreadable. The proponents based the study's conceptual framework on the symmetric and asymmetric key algorithms and procedures manual on enrollment of Southern Isabela College of arts and trades (SICAT) and ISO 25010. The study consists of three elements: developing the CHOY web app imbued with AES, testing it in terms of online registration and spam prevention, and evaluating it using the ISO 25010 in terms of compatibility, reliability, and security. The evaluation results show that implementing the AES in the CHOY web app meets the ISO 25010 criteria mentioned above.</span>
APA, Harvard, Vancouver, ISO, and other styles
5

de Andrade e Silva, Arnaldo Gualberto, Herman Martins Gomes, and Leonardo Vidal Batista. "A collaborative deep multitask learning network for face image compliance to ISO/IEC 19794-5 standard." Expert Systems with Applications 198 (July 2022): 116756. http://dx.doi.org/10.1016/j.eswa.2022.116756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Xucheng, and Shah Nazir. "Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method." Security and Communication Networks 2020 (September 1, 2020): 1–14. http://dx.doi.org/10.1155/2020/8829595.

Full text
Abstract:
Internet of Medical Things (IoMT) plays an important role in healthcare. Different devices such as smart sensors, wearable devices, handheld, and many other devices are connected in a network in the form of Internet of Things (IoT) for the smooth running of communication in healthcare. Security of these devices in healthcare is important due to its nature of functionality and efficiency. An efficient and robust security system is in dire need to cope with the attacks, threats, and vulnerability. The security evaluation of IoMT is an issue since couple of years. Therefore, the aim of the proposed study is to evaluate the security of IoMT by using the analytic network (ANP) process. The proposed approach is applied using ISO/IEC 27002 (ISO 27002) standard and some other important features from the literature. The results of the proposed research demonstrate the effective IoMT components which can further be used as secure IoMT.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Po-Tong, Jui Jen Chou, and Chiu Wang Tseng. "Pixel-wise Colorimetric Characterization based on U-Net Convolutional Network." Journal of Imaging Science and Technology 64, no. 4 (July 1, 2020): 40405–1. http://dx.doi.org/10.2352/j.imagingsci.technol.2020.64.4.040405.

Full text
Abstract:
Abstract In this article, we present a U-Net convolutional network for solving insufficient data problems of color patches in colorimetric characterization. The U-Net network uses data augmentation annotated over 6,885,222 colors, 32,027,200 color patches, and 2,098 billion pixels directly from only eight standard colorimetric images of ISO 12640 (CIELAB/SCID). By applying the U-Net network trained on big augmented data, the pixel-wise colorimetric characterization is implemented from digitalized red, green, blue image samples to ISO 12640 (CIELAB/SCID) CIELAB standard colorimetric images. The performance efficiency of the U-Net network is superior to that of the convolutional neural network on both training and validating epochs. Moreover, pixel-wise color colorimetric characterization is achieved using the intelligent machine vision of U-Net integrated with a data augmentation technique to overcome the drawback of complex color patches and labor-intensive tasks. This study might improve colorimetric characterization technology with a resolution of 2560-by-2048 for over 4 million pixels. The results reveal that U-net with pixel-wise regression enhances the precise colors of images, taking detail and realism to a new level.
APA, Harvard, Vancouver, ISO, and other styles
8

Meng, Long, and Liqun Chen. "Reviewing the ISO/IEC Standard for Timestamping Services." IEEE Communications Standards Magazine 5, no. 3 (September 2021): 20–25. http://dx.doi.org/10.1109/mcomstd.011.2000083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hannemyr, G., and P. R. Innocent. "A network user interface: Incorporating human factors guidelines into the ISO standard for open systems interconnection." Behaviour & Information Technology 4, no. 4 (October 1985): 309–26. http://dx.doi.org/10.1080/01449298508901810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Forte, Dario. "Keeping up to standard – incident management in ISO 17799." Network Security 2006, no. 4 (April 2006): 16–17. http://dx.doi.org/10.1016/s1353-4858(06)70359-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Fenz, Stefan, Stefanie Plieschnegger, and Heidi Hobel. "Mapping information security standard ISO 27002 to an ontological structure." Information & Computer Security 24, no. 5 (November 14, 2016): 452–73. http://dx.doi.org/10.1108/ics-07-2015-0030.

Full text
Abstract:
Purpose The purpose of this paper is to increase the degree of automation within information security compliance projects by introducing a formal representation of the ISO 27002 standard. As information is becoming more valuable and the current businesses face frequent attacks on their infrastructure, enterprises need support at protecting their information-based assets. Design/methodology/approach Information security standards and guidelines provide baseline knowledge for protecting corporate assets. However, the efforts to check whether the implemented measures of an organization adhere to the proposed standards and guidelines are still significantly high. Findings This paper shows how the process of compliance checking can be supported by using machine-readable ISO 27002 control descriptions in combination with a formal representation of the organization’s assets. Originality/value The authors created a formal representation of the ISO 27002 standard and showed how a security ontology can be used to increase the efficiency of the compliance checking process.
APA, Harvard, Vancouver, ISO, and other styles
12

Moretti, Christian, Blanca Corona, Robert Edwards, Martin Junginger, Alberto Moro, Matteo Rocco, and Li Shen. "Reviewing ISO Compliant Multifunctionality Practices in Environmental Life Cycle Modeling." Energies 13, no. 14 (July 11, 2020): 3579. http://dx.doi.org/10.3390/en13143579.

Full text
Abstract:
The standard ISO 14044:2006 defines the hierarchical steps to follow when solving multifunctionality issues in life cycle assessment (LCA). However, the practical implementation of such a hierarchy has been debated for twenty-five years leading to different implementation practices from LCA practitioners. The first part of this study discussed the main steps where the ISO hierarchy has been implemented differently and explored current multifunctionality practices in peer-reviewed studies. A text-mining process was applied to quantitatively assess such practices in the 532 multifunctional case studies found in the literature. In the second part of the study, citation network analysis (CNA) was used to identify the major publications that influenced the development of the multifunctionality-debate in LCA, i.e., the key-route main path. The identified publications were then reviewed to detect the origins of the different practices and their underlying theories. Based on these insights, this study provided some “food for thought” on current practices to move towards consistent methodology. We believe that such an advancement is urgently needed for better positioning LCA as a tool for sustainability decision-making. In particular, consistent allocation practices could be especially beneficial in bioeconomy sectors, where production processes are usually multifunctional, and where current allocation practices are not harmonized yet.
APA, Harvard, Vancouver, ISO, and other styles
13

Braa, K., and L. Øgrim. "Critical view of the application of the ISO standard for quality assurance." Information Systems Journal 5, no. 4 (October 1995): 253–69. http://dx.doi.org/10.1111/j.1365-2575.1995.tb00098.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Arnold, Stuart, and Harold W. Lawson. "Viewing systems from a business management perspective: The ISO/IEC 15288 standard." Systems Engineering 7, no. 3 (2004): 229–42. http://dx.doi.org/10.1002/sys.20006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Basin, David, Cas Cremers, and Simon Meier. "Provably repairing the ISO/IEC 9798 standard for entity authentication1." Journal of Computer Security 21, no. 6 (December 20, 2013): 817–46. http://dx.doi.org/10.3233/jcs-130472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Danmanee, Tanapoom, Kulit Na Nakorn, and Kultida Rojviboonchai. "CU-MAC: A Duty-Cycle MAC Protocol for Internet of Things in Wireless Sensor Networks." ECTI Transactions on Electrical Engineering, Electronics, and Communications 16, no. 2 (April 9, 2018): 30–43. http://dx.doi.org/10.37936/ecti-eec.2018162.171332.

Full text
Abstract:
Nowadays “Internet of Things” or IoT becomes the most popular technology in the Internet system. Types of devices and sensors have been connected as a network of devices and sensors. While a wireless sensor network is a traditional network of sensors that can be considered as a beginning point of IoT systems. Currently, these sensor data are not only exchanged within a local network but also are delivered to other devices in the Internet. Consequently, well-known organizations such as IEEE, IETF, ITU-T and ISO/IET are trying to set standards for wireless sensor devices in IoT systems. The recommended standard utilizes many of internet stack standards such as CoAP, UDP and IP. However, the traditional design of WSNs is to avoid using internet protocol in the system to reduce transmission overhead and power consumption due to resource limitation. Fortunately, the current technology in both hardware and software allow the internet standard to sufficiently operate in a small sensor. In this paper, we propose a MAC protocol named CU-MAC to efficiently support IoT standard that need request-respond communication or bi-direction communication. CU-MAC uses multi-channel communication to perform continuous and bi-directional data transfer at low duty-cycle. It also has a mechanism to overcome the hidden terminal problem. We evaluated the performance of CU-MAC on both simulation and real testbed based on Contiki OS. The result shows that CU-MAC outperforms other existing MAC protocols in term of packet delivery ratio at 98.7% and requires lower duty-cycle than others to operate in the high traffic environment.
APA, Harvard, Vancouver, ISO, and other styles
17

Prodanoff, Zornitza Genova, Edward L. Jones, Hongmei Chi, Sherif Elfayoumy, and Cynthia Cummings. "Survey of Security Challenges in NFC and RFID for E-Health Applications." International Journal of E-Health and Medical Communications 7, no. 2 (April 2016): 1–13. http://dx.doi.org/10.4018/ijehmc.2016040101.

Full text
Abstract:
Hospitals worldwide have implemented High Frequency (HF) Radio Frequency Identification (RFID) networks for supplies tracking in ER setting, in-patient identification, surgical instrument management, and other applications. Merging of Web, Near Filed Communication (NFC), and HF RFID technologies for their combined use in e-Health applications is a logical next step due to the wide availability of NFC-enabled smartphones. This article outlines some resulting security challenges. Tags are often compliant with multiple standards that operate in the same frequency range. For example, HF RFID tags have already been adopted for in-patient tracking, yet smartphone NFC reader apps can freely access data on those tags. While tag– or session–centered security protocols exist for some RFID standards (e.g. ISO/IEC 29167), no ISO security standard is currently available for HF RFID tags. In such systems, proper traffic characterization can lead to better understanding of operation under “normal” system state conditions and could potentially help to identify security breaches.
APA, Harvard, Vancouver, ISO, and other styles
18

Koumaras, Harilaos, Charalampos Skianis, and Anastasios Kourtis. "Analysis and Modeling of H.264 Unconstrained VBR Video Traffic." International Journal of Mobile Computing and Multimedia Communications 1, no. 4 (October 2009): 14–31. http://dx.doi.org/10.4018/jmcmc.2009072802.

Full text
Abstract:
In future communication networks, video is expected to represent a large portion of the total traffic, given thatespecially variable bit rate (VBR) coded video streams, are becoming increasingly popular. Consequently, traffic modeling and characterization of such video services is essential for the efficient traffic control and resource management. Besides, providing an insight of video coding mechanisms, traffic models can be used as a tool for the allocation of network resources, the design of efficient networks for streaming services and the reassurance of specific QoS characteristics to the end users. The new H.264/AVC standard, proposed by the ITU-T Video Coding Expert Group (VCEG) and ISO/IEC Moving Pictures Expert Group (MPEG), is expected to dominate in upcoming multimedia services, due to the fact that it outperforms in many fields the previous encoded standards. This article presents both a frame and a layer (i.e. I, P and B frames) level analysis of H.264 encoded sources. Analysis of the data suggests that the video traffic can be considered as a stationary stochastic process with an autocorrelation function of exponentially fast decay and a marginal frame size distribution of approximately Gamma form. Finally, based on the statistical analysis, an efficient model of H.264 video traffic is proposed.
APA, Harvard, Vancouver, ISO, and other styles
19

Jiang, Wenchan, Ming Yang, Ying Xie, and Zhigang Li. "Machine Learning-Based Coding Decision Making in H.265/HEVC CTU Division and Intra Prediction." International Journal of Mobile Computing and Multimedia Communications 11, no. 2 (April 2020): 41–60. http://dx.doi.org/10.4018/ijmcmc.2020040103.

Full text
Abstract:
High efficiency video coding (HEVC) has been deemed as the newest video coding standard of the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. In this research project, in compliance with H.265 standard, the authors focused on improving the performance of encode/decode by optimizing the partition of prediction block in coding unit with the help of supervised machine learning. The authors used Keras library as the main tool to implement the experiments. Key parameters were tuned for the model in the convolution neuron network. The coding tree unit mode decision time produced in the model was compared with that produced in the reference software for HEVC, and it was proven to have improved significantly. The intra-picture prediction mode decision was also investigated with modified model and yielded satisfactory results.
APA, Harvard, Vancouver, ISO, and other styles
20

Nathaniel, Arhantika, Angelic Goyal, and Parmeet Kaur. "A Distributed Storage System Using a Mobile Ad hoc Network." International Journal of Distributed Systems and Technologies 10, no. 3 (July 2019): 76–89. http://dx.doi.org/10.4018/ijdst.2019070105.

Full text
Abstract:
The Ambient Assisted Living (AAL) domain aims to support the daily life activities of elders, patients with chronic conditions, and disabled people. Several AAL platforms have been developed over the last two decades. Hence, there is a need to identify Quality Criteria (QC) and make it well defined in order to achieve the AAL system purposes. To be able to convince all stakeholders including both technologies and end users of AAL systems, high quality must be guaranteed. The goal of this article is to obtain a set of data quality characteristics that would be applicable to AAL system, and have its performance evaluated using sensor data. To this end, this work uses the ISO/IEC 25012 and ISO/IEC 25010 standards to extract the most relevant criteria that are apt for AAL systems. As a result, an evaluation approach on an indoor localization platform was made, and an evaluation procedure has been established. This is done by first generating a hierarchical data quality model, and have it evaluated using the metrics, based on the sensor data and the concept of fuzzy logic.
APA, Harvard, Vancouver, ISO, and other styles
21

Varona Taborda, María Alejandra. "Dynamic Cybersecurity Model based on ISO standards for Higher Education Institutions in Colombia." Ingeniería Solidaria 17, no. 3 (September 6, 2021): 1–21. http://dx.doi.org/10.16925/2357-6014.2021.03.05.

Full text
Abstract:
Introduction: This article is the result of a research process whose product was to generate a guide for Higher Education Institutions (in Spanish, IES) to adopt a Cybersecurity Model based on ISO standards (International Organization for Standardization). Problem: IES do not have a cybersecurity model aligned to the ISO / IEC 27032: 2012 standard (International Organization for Standardization / International Electrotechnical Commission), which causes a lack of clarity and uncertainty in the level of maturity and low efficiency in processes and information security controls to be implemented. Objective: Propose a dynamic model of cybersecurity based on ISO standards for IES. Methodology: The development of this work was oriented under a line of applied research, by virtue of the fact that it was necessary to address the problem based on previous knowledge that allowed supporting the theoretical contributions and the activities proposed to determine the possible causes of the problem and give it a possible solution. Results: The generation of this dynamic model allows it to be adapted to the different needs and requirements of IES. Conclusion: IES can implement a cybersecurity model to prevent and protect information at the cyberspace level. Originality: The work carried out generates a great contribution, which is the generation of a dynamic cybersecurity model, since at present there are no specific models for IES. Limitations: The model implementation guide is established in a general way to be applied later to an organization in any sector. Keywords: Dynamic Cybersecurity Model, Higher Education Institutions, ISO/IEC 27032: 2012, Security Standards.
APA, Harvard, Vancouver, ISO, and other styles
22

Kassim, Noordiana, Yusri Yusof, Ida Aryanie Bahrudin, Rafizah Mohd Hanifa, Mohd Hadri Mohamed Nor, Azizul Rahman Abd Aziz, and Zahrul Hisham Othman. "Information Structure of STEP Convertor of STEP-CNC Mapping System." Applied Mechanics and Materials 773-774 (July 2015): 38–42. http://dx.doi.org/10.4028/www.scientific.net/amm.773-774.38.

Full text
Abstract:
ISO 14649 standard, commonly recognized as STEP-NC is a data model interface for computer numerical controllers. STEP-NC goes much further that G codes and has a more comprehensive data model that overcomes the lack of process information in ISO 6983 files (G codes programming). The STEP compliant approach brings the possibility to integrate the machine controller to the overall enterprise information network, with the intention of having bi-directional data flow. This will provide the novel capability for upstream feedback of information from the numerical controller to the design and process areas in the process planning and manufacturing. This paper presents the key concepts of the proposed STEP Convertor of the STEP-CNC Mapping System. The objective of the main system is to take a generic STEP file as the input to drive a CNC machine tool. The main system is broken down into two main sub-systems, STEP Convertor and STEP-NC Translator. This paper will focus solely on the information structure and conceptualization of the STEP Convertor.
APA, Harvard, Vancouver, ISO, and other styles
23

Capuder, Lawrence. "ISO-17799 – Standard for Information Security: A Welcome Boon for Security Management and Audit." EDPACS 31, no. 11 (May 2004): 1–10. http://dx.doi.org/10.1201/1079/44239.31.11.20040501/81101.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Nik Ahmad, Nik Azlina, Nur Iman Mardhiah Hamid, and Anitawati Mohd Lokman. "Performing Usability Evaluation on Multi-Platform Based Application for Efficiency, Effectiveness, and Satisfaction Enhancement." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 10 (May 25, 2021): 103. http://dx.doi.org/10.3991/ijim.v15i10.20429.

Full text
Abstract:
<p class="0abstract">Usability evaluation is an essential activity to contribute to a higher standard of user experience. This study conducted a usability evaluation on multi-platform application according to usability attributes as defined in ISO 9241-11 standard which are efficiency, effectiveness, and satisfaction. The evaluation was conducted on both platforms; web and mobile application and involved 50 participants. The results discovered some points to usability issues. Therefore, to further enhance the users’ satisfaction, efficiency, and effectiveness, a set of improvement recommendations were proposed. Insights from this study provides a standard basis on the usability evaluation procedure which can serve as a guide for the usability evaluation of multi-platform applications.</p>
APA, Harvard, Vancouver, ISO, and other styles
25

Mahmoud, Ahmed F., and Mahmoud I. Abdallah. "Performance Testing of Twisted Pair Cables." Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–8. http://dx.doi.org/10.1155/2008/586427.

Full text
Abstract:
This work introduces characteristics of twisted pair cables which play an important role in transferring data. In this paper, category 5 enhanced as a type of unshielded twisted pair cables was selected to verify all tests on it according to ISO/IEC 11801 as one of international standard specifications. Random samples were selected from cables market. All tests were done on these samples to make sure of using validity and complying with the international standard. After testing the selected samples, it is found that are not satisfying the international standard specification while as are satisfying the international standard specification.
APA, Harvard, Vancouver, ISO, and other styles
26

C, Jaymar, and Marifel Grace Capili-Kummer. "Giddy Ion Reloaded: Desktop Manager, Optimizer with Multi Utility Tool." International Journal of Recent Technology and Engineering 9, no. 5 (January 30, 2021): 154–58. http://dx.doi.org/10.35940/ijrte.e5238.019521.

Full text
Abstract:
The performance of our computer is vital in fulfilling the task of the user. The paper presents a solution for maintaining the performance of the computer specifically computers with Windows operating systems. In this article, the fundamental difference and problem of the Windows operating system are defined which roots in the architectural design of using single configuration storage. The security hole of windows authentication, the exploitation of Microsoft EFS, and the acquisition of password hashes from Microsoft SAM are also discussed. Various existing utility software is evaluated to investigate if they meet the user define criteria. This paper also proposes a user-level implementation of the AES 256 encryption algorithm for securing user files and a Network Blocking algorithm based on ARP Spoofing techniques that provide a user-level network monitoring capability. The proposed application is called “Giddy-ION Reloaded” which consists of four main modules; machine information acquisition and monitoring, machine optimization, machine cleaning, and tools module that is divided into submodule; encryption and decryption, network monitoring, desktop management, network optimization/ control, and task automation. The testing was conducted with the participants coming from a computer college, continuing education trainer/faculty, and various IT experts. The response from these groups was statistically treated and analyzed, where the Giddy ION rank top and shows promising results. The study is limited to windows machines with 64-bit support architecture. The developed application is ready for implementation and deployment as evidenced by its high overall performance rating as evaluated by the participants against the ISO 25010 standards.
APA, Harvard, Vancouver, ISO, and other styles
27

Seidman, Seth J., and Howard I. Bassen. "Determining EMC Test Levels for Implantable Devices in Bipolar Lead Configuration." Biomedical Instrumentation & Technology 55, no. 3 (July 1, 2021): 91–95. http://dx.doi.org/10.2345/0890-8205-55.3.91.

Full text
Abstract:
Abstract Certain low-frequency magnetic fields cause interference in implantable medical devices. Electromagnetic compatibility (EMC) standards prescribe injecting voltages into a device under evaluation to simplify testing while approximating or simulating real-world exposure situations to low-frequency magnetic fields. The EMC standard ISO 14117:2012, which covers implantable pacemakers and implantable cardioverter defibrillators (ICDs), specifies test levels for the bipolar configuration of sensing leads as being one-tenth of the levels for the unipolar configuration. The committee authoring this standard questioned this testing level difference and its clinical relevance. To evaluate this issue of EMC test levels, we performed both analytical calculations and computational modeling to determine a basis for this difference. Analytical calculations based upon Faraday's law determined the magnetically induced voltage in a 37.6-cm lead. Induced voltages were studied in a bipolar lead configuration with various spacing between a distal tip electrode and a ring electrode. Voltages induced in this bipolar lead configuration were compared with voltages induced in a unipolar lead configuration. Computational modeling of various lead configurations was performed using electromagnetic field simulation software. The two leads that were insulated, except for the distal and proximal tips, were immersed in a saline-conducting media. The leads were parallel and closely spaced to each other along their length. Both analytical calculations and computational modeling support continued use of a one-tenth amplitude reduction for testing pacemakers and ICDs in bipolar mode. The most recent edition of ISO 14117 includes rationale from this study.
APA, Harvard, Vancouver, ISO, and other styles
28

Rodríguez Pincay, Ronny, William Lino Villacreses, Nereida Valero Cedeño, and Alfonso Jamil Cedillo Balcázar. "DIAGNÓSTICO DE ESTÁNDARES DE CALIDAD INTERNACIONALES EN LABORATORIOS DE DOCENCIA DE UNA UNIVERSIDAD ECUATORIANA." Enfermería Investiga 6, no. 5 (December 3, 2021): 4. http://dx.doi.org/10.31243/ei.uta.v6i5.1449.2021.

Full text
Abstract:
Introducción: El Laboratorio de Docencia es un sitio donde el estudiante puede acceder a ella en su proceso de aprendizaje, al igual que el Laboratorio Clínico, están ligados a normas que se deben de cumplir para poder funcionar como sitio de enseñanza, un sistema de gestión de calidad son actividades coordinas para dirigir y controlar una organización con respecto a la calidad, están definidas por la Organización Internacional de Normalización (ISO), los indicadores estándar son aplicados de manera internacional y adaptables a cualquier tipo de laboratorio. Objetivo: diagnosticar los estándares de calidad internacionales en laboratorios de docencia una universidad ecuatoriana. Métodos: diseño de estudio descriptivo y analítico de corte transversal, se utilizaron fuentes bibliográficas basadas en fuentes primarias, secundarias y terciarias, el universo total fue de 4 laboratorios de docencia; para la recolección de información de utilizaron dos instrumentos validados por la OPS/HSP/HSE y el MSP del Ecuador. Resultados: Se encontró que, del total de indicadores de la primera encuesta, el 52,6% equivalente a 20 parámetros se cumplen, mientras que el 47,4% (n:18) no lo hace; en la segunda encuesta el 53,3% (n:16) cumple con lo requerido, mientras que el 46,7% (n:14) no lo hace. Conclusiones: los indicadores estándares son importantes a la hora de la pedagogía en los laboratorios de docencia de la Carrera de Laboratorio Clínico de la UNESUM. Palabras clave: Gestión de la calidad, Normas ISO 15189, Laboratorio de Docencia, Calidad ABSTRACT Introduction: The Teaching Laboratory is a site where the student can access it in their learning process, like the Clinical Laboratory, they are linked to standards that must be met in order to function as a teaching site, a management system Quality are coordinated activities to direct and control an organization with respect to quality, they are defined by the International Organization for Standardization (ISO), the standard indicators are applied internationally and adaptable to any type of laboratory. Objective: diagnose international quality standards in teaching laboratories an Ecuadorian university. Methods: descriptive and analytical cross-sectional study design, bibliographic sources based on primary, secondary and tertiary sources were used, the total universe was 4 teaching laboratories; Two instruments validated by PAHO / HSP / HSE and the MSP of Ecuador were used to collect information. Results: It was found that, of the total of indicators from the first survey, 52.6% equivalent to 20 parameters are met, while 47.4% (n:18) do not; in the second survey, 53.3% (n: 16) met the requirements, while 46.7% (n:14) did not. Conclusions: the standard indicators are important when it comes to pedagogy in the teaching laboratories of the Clinical Laboratory Career of UNESUM. Keywords: Quality management, ISO 15189 Standards, Teaching Laboratory, Quality
APA, Harvard, Vancouver, ISO, and other styles
29

Fangrat, J. "Combustability of building products versus fire safety." Bulletin of the Polish Academy of Sciences Technical Sciences 64, no. 4 (December 1, 2016): 709–17. http://dx.doi.org/10.1515/bpasts-2016-0080.

Full text
Abstract:
Abstract The combustion process is described and analysed based on the experimental results in the context of building fire safety. Data are obtained by means of five standard methods: ISO 5657 ignitability test, ISO 5657 cone calorimeter, ISO 9705 room corner test, EN ISO 1716 small calorimeter, and EN ISO 1182 small furnace. Various categories of building products were tested: cellulose based products (particle boards, plywoods), solid wood, floor coverings, concrete, ceramics, insulations (thermal and/or acoustic), boards (wall/ceiling), mortars, adhesives, and thin coatings. The studied products exhibited very different fire properties from non-combustible to easily combustible. In order to more effectively differentiate non-combustibles and combustibles within building products, the modified heat of combustion was calculated using all test results according to EN ISO 1716 and EN ISO 1182. The revision of criteria for Euro class A1 and A2 is proposed to obtain more realistic reaction-to-fire evaluation. In conclusion, it is advised to use single limit for heat of combustion for A1 and A2 Euro class. The proposed approach for modified heat of combustion is a convenient tool for the fast and cost-effective initial test method for non-combustibility evaluation and seems to be the proper method for distinguishing between non-combustibles and combustibles within building products. It is a better reflection of the real physical process of combustion than the current one. The third A1 criterion is questionable, regarding time to auto-ignition in EN ISO 1182 cylindrical furnace. The measurement for gross heat of combustion by EN ISO 1716 method is proposed for all Euro classes of building products with different limit values.
APA, Harvard, Vancouver, ISO, and other styles
30

Mantra, IGN, Aedah Abd. Rahman, and Hoga Saragih. "Maturity Framework Analysis ISO 27001: 2013 on Indonesian Higher Education." International Journal of Engineering & Technology 9, no. 2 (April 18, 2020): 429. http://dx.doi.org/10.14419/ijet.v9i2.30581.

Full text
Abstract:
Information Security Management System (ISMS) implementation in Institution is an effort to minimize information security risks and threats such as information leakage, application damage, data loss and declining IT network performance. The several incidents related to information security have occurred in the implementation of the Academic System application in Indonesian higher education. This research was conducted to determine the maturity level of information security practices in Academic Information Systems at universities in Indonesia. The number of universities used as research samples were 35 institutions. Compliance with the application of ISO 27001:2013 standard is used as a reference to determine the maturity level of information system security practices. Meanwhile, to measure and calculate the level of maturity using the SSE-CMM model. In this research, the Information System Security Index obtained from the analysis results can be used as a tool to measure the maturity of information security that has been applied. There are six key areas examined in this study, namely the role and importance of ICT, information security governance, information security risk management, information security management framework, information asset management, and information security technology. The results showed the level of information security maturity at 35 universities was at level 2 Managed Process and level 3 Established Process. The composition is that 40% of universities are at level 3, and 60% are out of level 3. The value of the gap between the value of the current maturity level and the expected level of maturity is varied for each clause (domain). The smallest gap (1 level) is in clause A5: Information Security Policy, clause A9: Access Control, and clause A11: Physical and environmental security. The biggest gap (4 levels) is in clause A14: System acquisition, development and maintenance and clause A18: compliance.
APA, Harvard, Vancouver, ISO, and other styles
31

Nagni, Maurizio, and Spiros Ventouras. "Implementation of UML Schema in Relational Databases." International Journal of Distributed Systems and Technologies 4, no. 4 (October 2013): 50–60. http://dx.doi.org/10.4018/ijdst.2013100105.

Full text
Abstract:
Numerous disciplines require information concerning phenomena implicitly or explicitly associated with a location relative to the Earth. Disciplines using Geographic Information (GI) in particular are those within the earth and physical sciences, and increasingly those within social science and medical fields. Therefore geographic datasets are increasingly being shared, exchanged and frequently re-purposed for uses beyond their original intended use. Being part of the ISO 19100 Geographic Information Standard series, the ISO 19136 called Geography Markup Language (GML), defines the rules a data model described using the Unified Modeling Language (UML) has to follow in order to generate from it an XSD schema. However, if GML is essential for exchange data among different organization, it may not be the best option for persisting or searching operations. On the other side, the Relational Database Model (RDBM) has been heavily optimized over the decades to store and search data. This paper does not address “How to store an GML complaint document in an RDBM” but “How to realize an RDBM from an ISO 19100 complaint UML data model” and within this context, it describes the experience and the lessons learnt. The conclusions show how the information contained in such UML is able to produce not only representations as GML schema, but also RDBM or RDF without passing by any intermediary step.
APA, Harvard, Vancouver, ISO, and other styles
32

Warman, Indra, and Alex Franozal. "QoS Analysis on OSPFv3 And RIPng Using GRE Tunneling on IPv6 Integrated Ipv4 Network." MATEC Web of Conferences 215 (2018): 01005. http://dx.doi.org/10.1051/matecconf/201821501005.

Full text
Abstract:
Every year, the availability of public IPv4 addresses is running low. However, the IETF (Internet Engineering Task Force) has set a new addressing standard called IPv6 (Internet Protocol version 6). IPv6 implementations can not be immediately performed on all end-to-end lines, a transition phase is required, one of which is the GRE tunneling method. IPv6 has some differences with IPv4, then in line with the presence of IPv6 will required the protocol that compatible with IPv6, among which is the routing protocol. Some dynamic routing protocols are created to support and can run on IPv6 such as RIPng and OSPFv3. Aim of this study is examines OSPFv3 routing protocols and RIPng routing protocols in terms of Quality of Service (QoS). The test is done by using seven routers with three scenarios in each routing protocol, ie scenario with best path active condition, when the network changes in other words best path down, and the scenario with best path condition has changed and the network has returned to normal. Testing is done by testing QoS parameters (delay, packet loss, and throughput) when the client computer downloads files with the .iso extension from the server. Downloaded files have different sizes, from 100 Mega Byte to 1 Giga Byte. From the results obtained that OSPFv3 provides better QoS (delay, packet loss, and throughput) than RIPng on integrated IPv6 network using GRE tunnel and can be a reference when going to transition from IPv4 to IPv6 using GRE Tunnel.
APA, Harvard, Vancouver, ISO, and other styles
33

Grimaccia, Francesco, Alessandro Niccolai, Marco Mussetta, and Giuseppe D’Alessandro. "ISO 50001 Data Driven Methods for Energy Efficiency Analysis of Thermal Power Plants." Applied Sciences 13, no. 3 (January 20, 2023): 1368. http://dx.doi.org/10.3390/app13031368.

Full text
Abstract:
This paper proposes an energy management system based on an Artificial Neural Network (ANN) to be integrated with the standard ISO 50001 and aims to describe the definition and the enhancement of the energy baselines by means of artificial intelligence techniques applied and tested on the real electrical absorption data of the auxiliary units of different thermal power plants in Italy. Power plant optimized operations are important both for cost and energy performance reasons with related effects on the environment in the next future energy transition scenario. The improvement of the energy baselines consists in determining more accurate consumption monitoring models that are able to track inefficiencies and absorption drifts through data analytics and Artificial Intelligence. Starting from the analysis of the energy vectors at the production site level, we performed a multi-scale analysis to define the consumption at macro areas level and finally find the most relevant consumption units within the plants. A comparison of different ANNs applied to several real power plant data was performed to model complex plant architecture and optimize energy savings with respect to pre-set thresholds according to the ISO 50001 standard procedure. The energy baselines are determined through the analysis of the data available in the power plants’ Distributed Control System (DCS), and we can identify the consumption derived from the unit’s proper operation. Based on the reported numerical simulations, improved baselines have been reached up to a 5% threshold for different plant sub-units, thus representing a relevant overall saving in terms of alert threshold definition and related control efficiency: a potential saving of about 140 MWh throughout the considered three-year dataset was obtained taking into account a cooling tower sub-unit, representing a considerable economic benefit. The results obtained highlight the neural technique efficiency in defining more accurate energy baselines and represents a valuable tool for large energy plant asset management to face relevant energy drifts observed in the last years of plant operation.
APA, Harvard, Vancouver, ISO, and other styles
34

Michel, Hervé, Thomas Kroc, Brian J. McEvoy, Deepak Patil, Pierre Reppert, and Mark A. Smith. "Potential Induced Radioactivity in Materials Processed with X-ray Energy Above 5 MeV." Biomedical Instrumentation & Technology 55, s3 (March 1, 2021): 17–26. http://dx.doi.org/10.2345/0899-8205-55.s3.17.

Full text
Abstract:
Abstract Section 5.1.2 of ANSI/AAMI/ISO 11137-1 states that “the potential for induced radioactivity in product shall be assessed.” This article describes how compliance with this requirement may be achieved using qualified test methods. Materials of consideration are conceptually discussed, and results of testing conducted on products processed with a 7.5-MeV X-ray irradiation process are provided. As X-ray becomes more widely used in healthcare sterilization, having standard assessment protocols for activation coupled with a shared database of material test results will benefit manufacturers seeking to utilize this innovative technology.
APA, Harvard, Vancouver, ISO, and other styles
35

Shin, Young-Rok, and Eui-Nam Huh. "mCSQAM: Service Quality Assessment Model in Mobile Cloud Services Environment." Mobile Information Systems 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/2517052.

Full text
Abstract:
Cloud computing is high technology that extends existing IT capabilities and requirements. Recently, the cloud computing paradigm is towards mobile with advances of mobile network and personal devices. As concept of mobile cloud, the number of providers rapidly increases for various mobile cloud services. Despite development of cloud computing, most service providers used their own policies to deliver their services to user. In other words, quality criteria for mobile cloud service assessment are not clearly established yet. To solve the problem, there were some researches that proposed models for service quality assessment. However, they did not consider various metrics to assess service quality. Although existing research considers various metrics, they did not consider newly generated Service Level Agreement. In this paper, to solve the problem, we proposed a mobile cloud service assessment model called mCSQAM and verify our model through few case researches. To apply the mobile cloud, proposed assessment model is transformed from ISO/IEC 9126 which is an international standard for software quality assessment. mCSQAM can provide service quality assessment and determine raking of the service. Furthermore, if Cloud Service Broker includes mCSQAM, appropriate services can be recommended for service users using user and service conditions.
APA, Harvard, Vancouver, ISO, and other styles
36

Mažeika, D., and R. Butleris. "Integrating Security Requirements Engineering into MBSE: Profile and Guidelines." Security and Communication Networks 2020 (March 12, 2020): 1–12. http://dx.doi.org/10.1155/2020/5137625.

Full text
Abstract:
Model-Based System Engineering (MBSE) provides a number of ways on how to create, validate, and verify the complex system design; unfortunately, the inherent security aspects are addressed neither by the SysML language that is the main MBSE enabler nor by popular MBSE methods. Although there are many common points between MBSE and security requirements engineering, the key advantages of MBSE (such as managed complexity, reduced risk and cost, and improved communication across a multidisciplinary team) have not been exploited enough. This paper reviews security requirements engineering processes and modeling methods and standards and provides the MBSE security profile as well, which is formalized with the UML 2.5 profiling capability. The new UML-based security profile conforms to the ISO/IEC 27001 information security standard. In addition to the MBSE security profile, this paper also presents the security profile application use case and the feasibility study of current status for security and systems engineering processes.
APA, Harvard, Vancouver, ISO, and other styles
37

Семеріков, Сергій, Ілля Теплицький, Юлія Єчкало, and Арнольд Ків. "Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot." Педагогіка вищої та середньої школи 51 (December 13, 2018): 159–91. http://dx.doi.org/10.31812/pedag.v51i0.3667.

Full text
Abstract:
Semerikov S.O., Teplytsʹkyy I.O., Yechkalo YU.V. and Kiv A.E. Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot. The article substantiates the necessity to develop training methods of computer simulation of neural networks in the spreadsheet environment. The systematic review of their application to simulating artificial neural networks is performed. The authors distinguish basic approaches to solving the problem of network computer simulation training in the spreadsheet environment, joint application of spreadsheets and tools of neural network simulation, application of third-party add-ins to spreadsheets, development of macros using the embedded languages of spreadsheets; use of standard spreadsheet add-ins for non-linear optimization, creation of neural networks in the spreadsheet environment without add-ins and macros. After analyzing a collection of writings of 1890–1950, the research determines the role of the scientific journal “Bulletin of Mathematical Biophysics”, its founder Nicolas Rashevsky and the scientific community around the journal in creating and developing models and methods of computational neuroscience. There are identified psychophysical basics of creating neural networks, mathematical foundations of neural computing and methods of neuroengineering (image recognition, in particular). The role of Walter Pitts in combining the descriptive and quantitative theories of training is discussed. It is shown that to acquire neural simulation competences in the spreadsheet environment, one should master the models based on the historical and genetic approach. It is indicated that there are three groups of models, which are promising in terms of developing corresponding methods — the continuous two-factor model of Rashevsky, the discrete model of McCulloch and Pitts, and the discrete-continuous models of Householder and Landahl.
APA, Harvard, Vancouver, ISO, and other styles
38

Mohamed, Sundus Abdulmuttalib, Omar Ibrahim Alsaif, and Ibrahim Ahmed Saleh. "Intrusion Detection Network Attacks Based on Whale Optimization Algorithm." Ingénierie des systèmes d information 27, no. 3 (June 30, 2022): 441–46. http://dx.doi.org/10.18280/isi.270310.

Full text
Abstract:
Network intrusion detection is a significant issue faced by the Information technology industry. Hacker's attacks set of techniques cause confusion network and computer systems, therefore, the need for a network penetration detection process became urgent. This paper proposed an optimization method to detect the potential of attacks on network packets effectively by defining unfamiliar patterns in a massive volume of the network traffic. Initially, the packet characteristics are defined as the normal dispersal of attributes from the data packet. This algorithm is used a bio-inspired meta-heuristic technique named whale optimization algorithm (WOA) to detect systems against the attackers. The detection method whale optimization (DMWO) is applied to calculate the process of standard deviation distribution to judge the anomaly of the data packet. The simulation algorithm performed by OPNET and Matlab-2015a to main factors of DMGO to classify the input to check whether any attack is present or not. Finally, the performance of this algorithm is a better flexibility result compared with other algorithms DMCM and IHMM.
APA, Harvard, Vancouver, ISO, and other styles
39

Harabuga, Yu S. "FEATURES OF COMPUTER TECHNICAL RESEARCH OF THE INFORMATION IN THE MEMORY OF SIM, USIM AND R-UIM-CARDS." Theory and Practice of Forensic Science and Criminalistics 17 (November 29, 2017): 318–24. http://dx.doi.org/10.32353/khrife.2017.40.

Full text
Abstract:
The paper considers the features of expert research of elementary files contents of SIM, USIM and R-UIM-cards, the information on which is absent in the current edition of technique 10.9.10 «Technique of computer technical research of information in the memory of SIM-cards». Effective standards which regulate the structure of files in SIM, USIM and R-UIM-cards, are specified. For today there are three types of identification modules of cellular communication customers: SIM-cards for networks of standard GSM, R-UIM-cards for networks ofstandard CDMA and USIM-cards for networks ofstandards UMTS and LTE. The hierarchical structure of a SIM-card corresponds to the hierarchical structure of a smart card of standard ISO/IEC 7816-4 and consists from three types of files: the main file (MF), the intended file (DF) and an elementary file (EF). For addressing or identification of each concrete file the identifier of a file is used which consists of two bytes. The first byte ofthe identifier definesfile type. The attention is paid to the elementary file EFspn in which the name of a cellular communication operator is stored. The theoretical and practical information concerning research of the content of the intended file DFpHONEBCOK is presented in which the telephone book of an USIM-card is stored. It’s specified that elementary file EFSMS is stored in the memory of a R-UIM-card in other intended file in comparison with SIM and USIM-cards. The research algorithm of contents EFSMS file in memory of a R-UIM-card is offered. The attention that in identification number of a R-UIM-card some Ukrainian CDMA-operators specify a mobile code of the country 255 instead of the international telephone code of Ukraine 380, is paid. Keeping in mind the presented information will help to avoid expert errors during computer technical research of the information in the memory of SIM, USIM and R-UIM-cards.
APA, Harvard, Vancouver, ISO, and other styles
40

De Blasiis, Maria Rosaria, Alessandro Di Benedetto, Margherita Fiani, and Marco Garozzo. "Assessing of the Road Pavement Roughness by Means of LiDAR Technology." Coatings 11, no. 1 (December 25, 2020): 17. http://dx.doi.org/10.3390/coatings11010017.

Full text
Abstract:
The assessment of the road roughness conditions plays an important role to ensure the required performances related to road safety and ride comfort, furthermore providing a tool for pavement maintenance and rehabilitation planning. In this work, the authors compared the roughness index (International Roughness Index, IRI) derived from high speed inertial profilometer with two other roughness indices, one dynamic and one geometric computed on a digital elevation model (DEM) built by using mobile laser scanner (MLS) data. The MLS data were acquired on an extra-urban road section and interpolated on the nodes of a DEM with a curvilinear abscissa, coinciding with the global navigation satellite system (GNSS) track of the profilometer. To estimate the grid cell elevation, we applied two interpolation methods, ordinary kriging (OK) and inverse distance weighting (IDW), over the same data. The roughness values computed on the surface of the DEM showed a similar trend and a high correlation with those acquired by the profilometer, higher for the dynamic index than for the geometric index. The differences between the IRI values by profilometer and those computed on the DEM were small enough not to significantly affect the judgments on the analyzed sections. Moreover, the road sub-sections derived from profilometer measure that were classified as critical coincided with those derived from light detection and ranging (LiDAR) surveys. The proposed method can be used to perform a network-level analysis. In addition, to evaluate the effects of vibrations on human comfort, we input the DEMs into a dynamic simulation software in order to compute the vertical accelerations, as specified in the UNI ISO 2631 standard. The values obtained were in line and correlated with those inferred from the standard methodology for profilometer measures.
APA, Harvard, Vancouver, ISO, and other styles
41

Arifin, Ajib Setyo, M. B. Fathinah Hanun, Eka Maulana, I. Wayan Mustika, and Fitri Yuli Zulkifli. "Design of a portable radio-frequency-identification reader capable to reading a user memory bank for smart-building energy management." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 3 (September 1, 2021): 1538. http://dx.doi.org/10.11591/ijeecs.v23.i3.pp1538-1549.

Full text
Abstract:
Communication is an important factor in smart-building energy management (SBEM). Many communications technologies have been applied to SBEM, including radio-frequency identification (RFID). RFID has been used not only for identification but also for carrying information, which is stored in a user memory bank attached to the tag. To access the user memory bank, an RFID reader should comply with ISO 18000-6C standards. The greatest challenge of RFID-reader technology is its short communication range, which limits the sensing area. To overcome this problem, this paper proposes a portable RFID reader built to an ISO 18000-6C standard to extend the sensing area due to its moveability. The reader is designed using low-cost devices widely available on the market for ease of duplication and assembly by researchers, educators, and startups. The proposed RFID reader can read passive tags with distances up to 12 and 5.5 m for line-of-sight (LOS) and non-line-of-sight (NLOS) communication, respectively. The minimum received-signal-strength indicators (RSSIs) for LOS and NLOS are found to be −63.75 and −59.66 dBm, respectively. These results are comparable with those of non-portable RFID readers on the market.
APA, Harvard, Vancouver, ISO, and other styles
42

Lundström, Lukas, and Jan Akander. "Bayesian Calibration with Augmented Stochastic State-Space Models of District-Heated Multifamily Buildings." Energies 13, no. 1 (December 22, 2019): 76. http://dx.doi.org/10.3390/en13010076.

Full text
Abstract:
Reliable energy models are needed to determine building energy performance. Relatively detailed energy models can be auto-generated based on 3D shape representations of existing buildings. However, parameters describing thermal performance of the building fabric, the technical systems, and occupant behavior are usually not readily available. Calibration with on-site measurements is needed to obtain reliable energy models that can offer insight into buildings’ actual energy performances. Here, we present an energy model that is suitable for district-heated multifamily buildings, based on a 14-node thermal network implementation of the ISO 52016-1:2017 standard. To better account for modeling approximations and noisy inputs, the model is converted to a stochastic state-space model and augmented with four additional disturbance state variables. Uncertainty models are developed for the inputs solar heat gains, internal heat gains, and domestic hot water use. An iterated extended Kalman filtering algorithm is employed to enable nonlinear state estimation. A Bayesian calibration procedure is employed to enable assessment of parameter uncertainty and incorporation of regulating prior knowledge. A case study is presented to evaluate the performance of the developed framework: parameter estimation with both dynamic Hamiltonian Monte Carlo sampling and penalized maximum likelihood estimation, the behavior of the filtering algorithm, the impact of different commonly occurring data sources for domestic hot water use, and the impact of indoor air temperature readings.
APA, Harvard, Vancouver, ISO, and other styles
43

Quintana-Pedraza, Giovanni Andrés, Sara Cristina Vieira-Agudelo, and Nicolás Muñoz-Galeano. "A Cradle-to-Grave Multi-Pronged Methodology to Obtain the Carbon Footprint of Electro-Intensive Power Electronic Products." Energies 12, no. 17 (August 30, 2019): 3347. http://dx.doi.org/10.3390/en12173347.

Full text
Abstract:
This paper proposes the application of a cradle-to-grave multi-pronged methodology to obtain a more realistic carbon footprint (CF) estimation of electro-intensive power electronic (EIPE) products. The literature review shows that methodologies for establishing CF have limitations in calculation or are not applied from the conception (cradle) to death (grave) of the product; therefore, this paper provides an extended methodology to overcome some limitations that can be applied in each stage during the life cycle assessment (LCA). The proposed methodology is applied in a cradle-to-grave scenario, being composed of two approaches of LCA: (1) an integrated hybrid approach based on an economic balance and (2) a standard approach based on ISO 14067 and PAS 2050 standards. The methodology is based on a multi-pronged assessment to combine conventional with hybrid techniques. The methodology was applied to a D-STATCOM prototype which contributes to the improvement of the efficiency. Results show that D-STATCOM considerably decreases CF and saves emissions taken place during the usage stage. A comparison was made between Sweden and China to establish the environmental impact of D-STATCOM in electrical networks, showing that saved emissions in the life cycle of D-STATCOM were 5.88 and 391.04 ton CO2eq in Sweden and China, respectively.
APA, Harvard, Vancouver, ISO, and other styles
44

Lundström, Lukas, Jan Akander, and Jesús Zambrano. "Development of a Space Heating Model Suitable for the Automated Model Generation of Existing Multifamily Buildings—A Case Study in Nordic Climate." Energies 12, no. 3 (February 2, 2019): 485. http://dx.doi.org/10.3390/en12030485.

Full text
Abstract:
Building energy performance modeling is essential for energy planning, management, and efficiency. This paper presents a space heating model suitable for auto-generating baseline models of existing multifamily buildings. Required data and parameter input are kept within such a level of detail that baseline models can be auto-generated from, and calibrated by, publicly accessible data sources. The proposed modeling framework consists of a thermal network, a typical hydronic radiator heating system, a simulation procedure, and data handling procedures. The thermal network is a lumped and simplified version of the ISO 52016-1:2017 standard. The data handling consists of procedures to acquire and make use of satellite-based solar radiation data, meteorological reanalysis data (air temperature, ground temperature, wind, albedo, and thermal radiation), and pre-processing procedures of boundary conditions to account for impact from shading objects, window blinds, wind- and stack-driven air leakage, and variable exterior surface heat transfer coefficients. The proposed model was compared with simulations conducted with the detailed building energy simulation software IDA ICE. The results show that the proposed model is able to accurately reproduce hourly energy use for space heating, indoor temperature, and operative temperature patterns obtained from the IDA ICE simulations. Thus, the proposed model can be expected to be able to model space heating, provided by hydronic heating systems, of existing buildings to a similar degree of confidence as established simulation software. Compared to IDA ICE, the developed model required one-thousandth of computation time for a full-year simulation of building model consisting of a single thermal zone. The fast computation time enables the use of the developed model for computation time sensitive applications, such as Monte-Carlo-based calibration methods.
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Xiaoxia. "Quality Evaluation of Ranunculaceae Essential Oil with the Artificial Neural Network." Security and Communication Networks 2022 (May 13, 2022): 1–9. http://dx.doi.org/10.1155/2022/3856775.

Full text
Abstract:
The goal of this project is to use ANN to build a quality evaluation method for Ranunculaceae essential oils in order to assist businesses or individuals in setting up an automated essential oil quality evaluation system and reducing human resource consumption. Using computer software to evaluate the quality of Ranunculaceae essential oils, quantitatively evaluate product quality, and improve the automation of quality evaluation. The main research contents in this paper are as follows: (1) In-depth research on PSO and its development. The purpose of studying the PSO is to use PSO to replace gradient descent algorithm in BP network, so that the neural network model has a better network structure. This paper improves it on the basis of PSO. The basic improvement idea is to add a dynamic random position transformation to the particle, so that global optimization ability can be enhanced. The improved algorithm and the standard algorithm are compared and analyzed in the simulation experiments. The results verify that improved PSO has better optimization ability. (2) Replace training algorithm in the BP network with the IPSO and construct the BP network algorithm model of IPSO. The final implementation of the Ranunculaceae plant essential oil quality assessment model based on the IPSO-BP network was achieved by combining the Ranunculaceae plant essential oil quality evaluation index system with the Ranunculaceae plant essential oil quality evaluation index system. Finally, a simulation experiment was designed to compare the presentation of PSO-BP and IPSO-BP, when they were applied to the evaluation of Ranunculaceae vital oils. The experimental results show IPSO-BP has the highest estimate accuracy and the best performance.
APA, Harvard, Vancouver, ISO, and other styles
46

Danner, Julian, and Martin Kreuzer. "A Fault Attack on the Family of Enocoro Stream Ciphers." Cryptography 5, no. 4 (September 30, 2021): 26. http://dx.doi.org/10.3390/cryptography5040026.

Full text
Abstract:
A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only require that the attacker can reset the internal state and inject a random byte-fault, in a random register, during a known time period. For a single fault injection, we develop a differential clocking algorithm that computes a set of linear equations in the in- and output differences of the non-linear parts of the cipher and relates them to the differential keystream. The usage of these equations is two-fold. Firstly, one can determine those differentials that can be computed from the faulty keystream, and secondly they help to pin down the actual location and timing of the fault injection. Combining these results, each fault injection gives us information on specific small parts of the internal state. By encoding the information we gain from several fault injections using the weighted Horn clauses, we construct a guessing path that can be used to quickly retrieve the internal state using a suitable heuristic. Finally, we evaluate our framework with the ISO-standardized and CRYPTREC candidate recommended cipher Enocoro-128v2. Simulations show that, on average, the secret key can be retrieved within 20 min on a standard workstation using less than five fault injections.
APA, Harvard, Vancouver, ISO, and other styles
47

Sini, Jacopo, Massimo Violante, and Fabrizio Tronci. "A Novel ISO 26262-Compliant Test Bench to Assess the Diagnostic Coverage of Software Hardening Techniques against Digital Components Random Hardware Failures." Electronics 11, no. 6 (March 14, 2022): 901. http://dx.doi.org/10.3390/electronics11060901.

Full text
Abstract:
This paper describes a novel approach to assess detection mechanisms and their diagnostic coverage, implemented using embedded software, designed to identify random hardware failures affecting digital components. In the literature, many proposals adopting fault injection methods are available, with most of them focusing on transient faults and not considering the functional safety standards requirements. This kind of proposal can benefit developers involved in the automotive market, where strict safety and cost requirements make the adoption of software-only strategies convenient. Hence, we have focused our efforts on compliance with the ISO 26262 automotive functional safety standard. The approach concerns permanent faults affecting microcontrollers and it provides a mapping between the failure mode described in part 11 of the Standard and the chosen fault models. We propose a test bench designed to inject permanent failures into an emulated microcontroller and determine which of them are detected by the embedded software. The main contribution of this paper is a novel fault injection manager integrated with the open-source software GCC, GDB, and QEMU. This test bench manages all the assessment phases, from fault generation to fault injection and the ISA emulation management, up to the classification of the simulation results.
APA, Harvard, Vancouver, ISO, and other styles
48

Kh., Teeba Ismail, and Ibrahim I. Hamarash. "MODEL-Based Performance Quality Assessment for IoT Applications." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 12 (June 18, 2021): 4. http://dx.doi.org/10.3991/ijim.v15i12.21287.

Full text
Abstract:
<p class="0abstractCxSpFirst">The number of applications incorporating Internet of Things (IoT) concepts increases extraordinarily. This increase cannot continue without high-quality assurance. There are some difficulties in testing IoT applications; the system heterogeneity, test cost and time are taken to test the system, and the precision percentage of test results.</p><p class="0abstractCxSpLast">A well-known and possibly the best solution to overcoming these difficulties is to model the system for evaluation purposes, known as model-based testing (MBT). This paper aims to design a model-based testing approach to assess IoT applications performance quality attributes. The ISO 25000 quality model is used as a standard for software quality assurance applications. IoTMaaS is used as a case study to implement the methodological approach. The possible test cases were generated using the ACTS combinatorial test generation tool. The performance metrics of each test case were monitored until the optimum test case was identified, with the shortest response time and the least amount of resources used. The proposed testing method appears to be successful, according to the results.</p>
APA, Harvard, Vancouver, ISO, and other styles
49

Zhang, Qi, An Wang, Yongchuan Niu, Ning Shang, Rixin Xu, Guoshuang Zhang, and Liehuang Zhu. "Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/9701756.

Full text
Abstract:
Identity-based cryptographic algorithm SM9, which has become the main part of the ISO/IEC 14888-3/AMD1 standard in November 2017, employs the identities of users to generate public-private key pairs. Without the support of digital certificate, it has been applied for cloud computing, cyber-physical system, Internet of Things, and so on. In this paper, the implementation of SM9 algorithm and its Simple Power Attack (SPA) are discussed. Then, we present template attack and fault attack on SPA-resistant SM9. Our experiments have proved that if attackers try the template attack on an 8-bit microcontrol unit, the secret key can be revealed by enabling the device to execute one time. Fault attack even allows the attackers to obtain the 256-bit key of SM9 by performing the algorithm twice and analyzing the two different results. Accordingly, some countermeasures to resist the three kinds of attacks above are given.
APA, Harvard, Vancouver, ISO, and other styles
50

PITTARELLO, FABIO. "SEMANTIC DESCRIPTION OF WEB 3D WORLDS THROUGH SOCIAL TAGGING." International Journal of Software Engineering and Knowledge Engineering 21, no. 01 (February 2011): 73–102. http://dx.doi.org/10.1142/s0218194011005165.

Full text
Abstract:
Free-tagging is one of the leading mechanisms characterizing the so-called web 2.0, enabling users to define collaboratively the meaning of web data for improving their findability. Tagging is applied in several forms to hypermedia data, that represent the largest part of the information on the web. In spite of that, there is a growing part of web data made of 3D vectors representing real objects such as trees, houses and people that lacks any semantic definition. Such situation prevents any advanced use of the data contained inside these 3D worlds, including seeking, filtering and manipulation of the objects represented by vectors. This work proposes a bottom-up approach for adding semantics to such data, based on the collaborative effort of users navigating the web. This paper, after describing the similarities and the differences that characterize tagging for hypermedia and interactive 3D worlds, discusses the design choices that have guided the definition of a specification for associating tags to 3D objects. The proposed specification is based on X3D — the ISO standard for describing 3D interactive worlds for the net — and permits to tag a large part of the existing 3D worlds compliant with this standard. A client-software web architecture for tagging and navigating 3D worlds compliant with the specification presented is illustrated. Finally, a web-based user interface for tagging and browsing the result of the cooperative activity of users is presented and applied to a complex 3D world related to the cultural heritage domain.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography