6,076 research outputs found

    Revista Economica

    Get PDF

    Security aspects in cloud based condition monitoring of machine tools

    Get PDF
    In the modern competitive environments companies must have rapid production systems that are able to deliver parts that satisfy highest quality standards. Companies have also an increased need for advanced machines equipped with the latest technologies in maintenance to avoid any reduction or interruption of production. Eminent therefore is the need to monitor the health status of the manufacturing equipment in real time and thus try to develop diagnostic technologies for machine tools. This paper lays the foundation for the creation of a safe remote monitoring system for machine tools using a Cloud environment for communication between the customer and the maintenance service company. Cloud technology provides a convenient means for accessing maintenance data anywhere in the world accessible through simple devices such as PC, tablets or smartphones. In this context the safety aspects of a Cloud system for remote monitoring of machine tools becomes crucial and is, thus the focus of this pape

    Moving Towards Mobile Third Generation Telecommunications Standards: The Good and Bad of the \u27Anytime/Anywhere\u27 Solutions

    Get PDF
    Mobile communication technologies are changing every aspect of the daily life, bringing new opportunities in many areas. Several converging mobile systems can potentially change organizations significantly by shifting the traditional boundaries of work-life and the workplace. Mobile telephony, combining satellite and terrestrial cellular systems, already transformed the way people work by allowing \u27anytime/anywhere\u27 telephone calling and text messaging. Broadband mobile telephony opens additional avenues to provide information conveniently as quickly and easily as possible, when needed and where needed. The evolution of wireless technologies (from Wireless Personal Area Networks to ubiquitous Third Generation/Universal Mobile Telecommunication System - UMTS) increased the number of services available to business organizations and mobile workers. Machine-to-machine, vertical applications, and mobile office applications are increasingly being deployed. Service providers and mobile operators are also changing the way they operate as a result of the increasing availability of mobile broadband communication services. IT departments need to change their systems, upgrade, and adapt their infrastructure and policies to support these mobile services. These changes are both positive and negative. With this progression, some fundamental questions related to privacy, security, and a new concept of work place and work space are raised. The implications for developing economies, such as China, and their potential for leapfrogging are future attention areas

    Algorithms for advance bandwidth reservation in media production networks

    Get PDF
    Media production generally requires many geographically distributed actors (e.g., production houses, broadcasters, advertisers) to exchange huge amounts of raw video and audio data. Traditional distribution techniques, such as dedicated point-to-point optical links, are highly inefficient in terms of installation time and cost. To improve efficiency, shared media production networks that connect all involved actors over a large geographical area, are currently being deployed. The traffic in such networks is often predictable, as the timing and bandwidth requirements of data transfers are generally known hours or even days in advance. As such, the use of advance bandwidth reservation (AR) can greatly increase resource utilization and cost efficiency. In this paper, we propose an Integer Linear Programming formulation of the bandwidth scheduling problem, which takes into account the specific characteristics of media production networks, is presented. Two novel optimization algorithms based on this model are thoroughly evaluated and compared by means of in-depth simulation results

    Audit Process during Projects for Development of New Mobile IT Application

    Get PDF
    This paper presents characteristics of the computer audit process during software development life cycle focused on specific aspects of the mobile IT applications. There are highlighted specific features of the distributed informatics systems implemented in wireless environments as hardware components, wireless technologies, classes of wireless systems, specialized software for mobile IT applications, quality characteristics of the mobile IT applications, software development models and their specific stages and issues aspects of the computer audit during software development life cycle of the distributed informatics systems customized on mobile IT applications. In the computer audit process, tasks of the computer auditors and what controls they must implement are also presented.Audit Process, Mobile It Applications, Software Development Life Cycle, Project Management

    Alternate marking-based network telemetry for industrial WSNs

    Get PDF
    For continuous, persistent and problem-free operation of Industrial Wireless Sensor Networks (IWSN), it is critical to have visibility and awareness into what is happening on the network at any one time. Especially, for the use cases with strong needs for deterministic and real-time network services with latency and reliability guarantees, it is vital to monitor network devices continuously to guarantee their functioning, detect and isolate relevant problems and verify if all system requirements are being met simultaneously. In this context, this article investigates a light-weight telemetry solution for IWSNs, which enables the collection of accurate and continuous flowbased telemetry information, while adding no overhead on the monitored packets. The proposed monitoring solution adopts the recent Alternate Marking Performance Monitoring (AMPM) concept and mainly targets measuring end-to-end and hopby-hop reliability and delay performance in critical application flows. Besides, the technical capabilities and characteristics of the proposed solution are evaluated via a real-life implementation and practical experiments, validating its suitability for IWSNs
    corecore