Results 1 - 10 of 1309
Results 1 - 10 of 1309. Search took: 0.027 seconds
|Sort by: date | relevance|
[en] To find the accuracy of time in the fully digitalized SOE (Sequence of Events) system, we used a formal specification of the Network Time Protocol (NTP) Version 3, which is used to synchronize time keeping among a set of distributed computers. Through constructing a simple experimental environments and experimenting internet time synchronization, we analyzed the time errors of local clocks of SOE system synchronized with a time server via computer networks
[en] The Industrial Internet of Things (IIoT) is the industrial subset of the Internet of Things (IoT). IIoT incorporates big data technology, harnessing the instrumentation data, machine to machine communication and automation technologies that have existed in industrial settings for years. As industry in general trends towards the IIoT and as the screw compressor packages developed by Howden Compressors are designed with a minimum design life of 25 years, it is imperative this technology is embedded immediately. This paper provides the reader with a description on the Industrial Internet of Things before moving onto describing the scope of the problem for an organisation like Howden Compressors who deploy multiple compressor technologies across multiple locations and focuses on the critical measurements particular to high specification screw compressor packages. A brief analysis of how this differs from high volume package manufacturers deploying similar systems is offered. Then follows a description on how the measured information gets from the tip of the instrument in the process pipework or drive train through the different layers, with a description of each layer, into the final presentation layer. The functions available within the presentation layer are taken in turn and the benefits analysed with specific focus on efficiency and availability. The paper concludes with how packagers adopting the IIoT can not only optimise their package but by utilising the machine learning technology and pattern detection applications can adopt completely new business models. (paper)
[en] This paper presents the research developed at Universidad Nacional de Colombia about the e-Manufacturing platform that is being developed and implemented at LabFabEx (acronym in Spanish as "Laboratorio Fabrica Experimental"). This platform besides has an approach to virtual-remote labs that have been tested by several students and engineers of different industrial fields. At this paper it is shown the physical and communication experimental platform, the general scope and characteristics of this e-Manufacturing platform and the virtual lab approach. This research project is funded by COLCIENCIAS (Administrative Department of science, technology and innovation in Colombia) and the enterprise IMOCOM S.A
[en] A review of the state of the Internet in terms of traffic and services trends covering both the Research and Education and the Commercial Internet will first be given. The problematic behind the IPv4 to IPv6 migration will be explained shortly, a short review of the ongoing efforts to re-design the Internet in a clean-slate approach will then be made.
[en] Internet is often used for transaction based applications such as online banking, stock trading and shopping, where the service interruption or outages are unacceptable. Therefore, it is important for designers of such applications to analyze how hardware, software and performance related failures affect the quality of service delivered to the users. This paper presents analytical models for evaluating the service availability of web cluster architectures. A composite performance and availability modeling approach is defined considering various causes of service unavailability. In particular, web cluster systems are modeled taking into account: two error recovery strategies (client transparent and non-client-transparent) as well as two traffic models (Poisson and modulated Poisson). Sensitivity analysis results are presented to show their impact on the web service availability. The obtained results provide useful guidelines to web designers
[en] At Belle II, detector signals are digitized inside or near the detector and collected via high-speed optical serial links. Each frontend digitization board equips an FPGA for a unified data link and timing system interface to receive the system clock, the level-1 trigger, other fast timing signals and to return status signals. Timing signals are serialized and delivered via a commodity category-7 LAN cable, through a tree-structure distribution network made from cascaded 1-to-20 distribution modules. We report the performance of this timing distribution system.
[en] INDRA is the first Information Technology company in Spain and it presents here, through a series of transparencies, its own approach for the remote experimentation architecture for long pulses (REAL). All the architecture is based on Java-2 platform standards and REAL is a totally open architecture. By itself REAL offers significant advantages: -) access authentication and authorization under multiple security implementations, -) local or remote network access: LAN, WAN, VPN..., -) on-line access to acquisition systems for monitoring and configuration, -) scalability, flexibility, robustness, platform independence,.... The BeansNet implementation of REAL gives additional good things such as: -) easy implementation, -) graphical tool for service composition and configuration, -) availability and hot-swap (no need of stopping or restarting services after update or remodeling, and -) INDRA support. The implementation of BeansNet at the TJ-2 stellarator at Ciemat is presented. This document is made of the presentation transparencies. (A.C.)
[en] Nowadays there is a gap due to the absence of an updated and formalized methodology that can be used to assess security levels in WSNs (Wireless Sensor Network) under IoT (Internet of Things) devices in nuclear environments (which are considered hostile environments and require a higher level of security). This gap causes information security professionals to have difficulties in making a broad assessment of the vulnerabilities in their WSNs, with greater concern when coupled with IoT devices. This work aims to present a methodology to evaluate the reliability of the use of levels security with IoT devices for nuclear installations using WSNs. The proposal of the methodology consists of 5 main stages and 21 substage, which are part of the category of a function in groups of cyber security results that are linked to programmatic needs and specific activities of mandatory execution. Understanding so that the security of a WSN considering the current IoT context for nuclear installations is necessary, where important characteristics in these critical environments should be explored (e g., the presence of radioactivity, in addition to the decontamination of materials and equipment, determine access to authorized persons). The application of the defense-in-depth concept of anomaly solution management and prevention against atypical events to provide an effective safety mechanism, ensuring its safe use in these high criticality environments. (author)