首页 > 最新文献

2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)最新文献

英文 中文
IoT Measuring of UDP-Based Distributed Reflective DoS Attack 基于udp的分布式反射式DoS攻击物联网测量
L. Huraj, M. Šimon, Tibor Horák
IoT devices and their fast growth on the Internet cause many cyber-attacks problems. The number of compromised IoT devices can be used by DDoS (Distributed Denial of Service) attackers to imitate valid request packet or to form illegal request packet to the victim with a spoofed source IP addresses to hide themselves, meanwhile giving rise the system collapse, the obstruction of network/traffic, or disrupting of the victim Internet operation. In this article is demonstrated a specific kind of DDoS attack involving usually accessible IoT devices - the UDP-based Distributed Reflective DoS Attack (DRDoS). The packets are flooded by the attacker to the IoT device as a reflector with a source IP address set to the IP address of the victim who obtains the reflected replies and can be overloaded. To examine this kind of attack, there has to be four representatives of heterogeneous IoT devices involved: an IP camera, a smart light-bulb, a network printer, and a small single-board computer Raspberry Pi. This article illustrates the possibility of the IoT devices to be integrated into DRDoS attack and to flood a network as well as their potential to form a targeted attack on a narticular victim machine.
物联网设备及其在互联网上的快速增长引发了许多网络攻击问题。被入侵的物联网设备数量可以被DDoS (Distributed Denial of Service,分布式拒绝服务)攻击者利用伪造的源IP地址,模仿有效的请求报文,或向受害者形成非法请求报文,以隐藏自己,同时导致系统崩溃,网络/流量受阻,或受害者互联网运行中断。本文演示了一种特定类型的DDoS攻击,涉及通常可访问的物联网设备——基于udp的分布式反射式DoS攻击(DRDoS)。攻击者以反射器的形式将报文淹没到物联网设备,源IP地址设置为受害者的IP地址,受害者获得反射的回复,可以过载。要检查这种攻击,必须有四个异构物联网设备的代表:IP摄像机,智能灯泡,网络打印机和小型单板计算机树莓派。本文说明了将物联网设备集成到ddos攻击中并淹没网络的可能性,以及它们对非特定受害者机器形成有针对性攻击的可能性。
{"title":"IoT Measuring of UDP-Based Distributed Reflective DoS Attack","authors":"L. Huraj, M. Šimon, Tibor Horák","doi":"10.1109/SISY.2018.8524703","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524703","url":null,"abstract":"IoT devices and their fast growth on the Internet cause many cyber-attacks problems. The number of compromised IoT devices can be used by DDoS (Distributed Denial of Service) attackers to imitate valid request packet or to form illegal request packet to the victim with a spoofed source IP addresses to hide themselves, meanwhile giving rise the system collapse, the obstruction of network/traffic, or disrupting of the victim Internet operation. In this article is demonstrated a specific kind of DDoS attack involving usually accessible IoT devices - the UDP-based Distributed Reflective DoS Attack (DRDoS). The packets are flooded by the attacker to the IoT device as a reflector with a source IP address set to the IP address of the victim who obtains the reflected replies and can be overloaded. To examine this kind of attack, there has to be four representatives of heterogeneous IoT devices involved: an IP camera, a smart light-bulb, a network printer, and a small single-board computer Raspberry Pi. This article illustrates the possibility of the IoT devices to be integrated into DRDoS attack and to flood a network as well as their potential to form a targeted attack on a narticular victim machine.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"66 1","pages":"000209-000214"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76983182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Log File Authentication and Storage on Blockchain Network 区块链网络上的日志文件认证与存储
David Janos Feher, Barnabás Sándor
Authentication is the issue most talked about nowadays. Comparing with Blockchain we want to research the justification for the blockchain technology to be used in enterprise log analysis and the appearance of blockchain technology to develop and make remarkable change in enterprise log analysis.
身份验证是当今讨论最多的问题。与区块链相比,我们想研究区块链技术应用于企业日志分析的理由,以及区块链技术的出现对企业日志分析的发展和显著改变。
{"title":"Log File Authentication and Storage on Blockchain Network","authors":"David Janos Feher, Barnabás Sándor","doi":"10.1109/SISY.2018.8524848","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524848","url":null,"abstract":"Authentication is the issue most talked about nowadays. Comparing with Blockchain we want to research the justification for the blockchain technology to be used in enterprise log analysis and the appearance of blockchain technology to develop and make remarkable change in enterprise log analysis.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"1 1","pages":"000243-000248"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77279088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mobile Phones Thermo-Ergonomic Analysis 手机热工效学分析
P. Hell, P. J. Varga, Zsolt Illési
Our team performs thermo-ergonomic analysis of mobile devices for about a year now. Our added research provides further evidence that the current mobile device architecture has failures and even normal use of mobile devices cause undesirable overheating, which might lead to premature deterioration and inconvenient use. The results of our previous test highlighted the need to review the mobile device test methods, improve it by combining multiple criteria, and perform tests in a homogeneous environment. The revised approach allows us to compare and enhance the usability the test results. In our new piece of research, we fine-tuned the test environment and improved the test method by automating the process. The new software and hardware test environment also enable to conduct a more comprehensive analysis. [1]
我们的团队已经对移动设备进行了大约一年的热人体工程学分析。我们的进一步研究提供了进一步的证据,证明当前的移动设备架构存在故障,甚至正常使用移动设备也会导致不希望的过热,这可能导致过早老化和不方便使用。我们之前的测试结果强调需要审查移动设备测试方法,通过组合多个标准来改进它,并在同质环境中执行测试。修订后的方法允许我们比较和增强测试结果的可用性。在我们的新研究中,我们对测试环境进行了微调,并通过自动化过程改进了测试方法。新的软件和硬件测试环境也可以进行更全面的分析。[1]
{"title":"Mobile Phones Thermo-Ergonomic Analysis","authors":"P. Hell, P. J. Varga, Zsolt Illési","doi":"10.1109/SISY.2018.8524654","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524654","url":null,"abstract":"Our team performs thermo-ergonomic analysis of mobile devices for about a year now. Our added research provides further evidence that the current mobile device architecture has failures and even normal use of mobile devices cause undesirable overheating, which might lead to premature deterioration and inconvenient use. The results of our previous test highlighted the need to review the mobile device test methods, improve it by combining multiple criteria, and perform tests in a homogeneous environment. The revised approach allows us to compare and enhance the usability the test results. In our new piece of research, we fine-tuned the test environment and improved the test method by automating the process. The new software and hardware test environment also enable to conduct a more comprehensive analysis. [1]","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"9 1","pages":"000249-000254"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85392667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Demonstrating the Options for Automated Advanced Selective Waste Gathering 示范先进的自动选择性废物收集方案
I. Lakatos, A. Titrik, János Hollósi
Due to continuous developments, the exhausting and unpleasant work done by humans is going to be partly or totally replaced by automated devices. Such developments can be found in the field of transport concerning autonomous and networked vehicles. Although we are at a quite early stage of development, it is highly practical to make plans for a more distant future, i.e. targeting a totally automated selective waste gathering. Apart from the application of smart containers, this study presents alternatives for networked automated selective waste gathering.
由于不断的发展,人类所做的令人疲惫和不愉快的工作将部分或全部被自动化设备所取代。这种发展可以在自动驾驶和联网车辆的运输领域找到。虽然我们还处于相当早期的发展阶段,但为更遥远的未来制定计划是非常实际的,例如,以完全自动化的选择性废物收集为目标。除了智能容器的应用之外,本研究还提出了网络自动选择性废物收集的替代方案。
{"title":"Demonstrating the Options for Automated Advanced Selective Waste Gathering","authors":"I. Lakatos, A. Titrik, János Hollósi","doi":"10.1109/SISY.2018.8524707","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524707","url":null,"abstract":"Due to continuous developments, the exhausting and unpleasant work done by humans is going to be partly or totally replaced by automated devices. Such developments can be found in the field of transport concerning autonomous and networked vehicles. Although we are at a quite early stage of development, it is highly practical to make plans for a more distant future, i.e. targeting a totally automated selective waste gathering. Apart from the application of smart containers, this study presents alternatives for networked automated selective waste gathering.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"53 1","pages":"000167-000172"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91148579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bi-Capacities Based Pan-Integral 基于双容量的泛积分
Milos Todorov, Mirjana Strboja, B. Mihailovic
In this paper the notion of the discrete bipolar pan-integral is introduced. This new type of integral is based on bi-capacities. The main properties of the bipolar pan-integral and its relations with the bipolar Choquet integral and the bipolar pseudo-integral are considered. Some illustrative examples are presented.
本文引入了离散双极泛积分的概念。这种新的积分是基于双容量的。研究了双极泛积分的主要性质及其与双极Choquet积分和双极伪积分的关系。给出了一些说明性的例子。
{"title":"Bi-Capacities Based Pan-Integral","authors":"Milos Todorov, Mirjana Strboja, B. Mihailovic","doi":"10.1109/SISY.2018.8524736","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524736","url":null,"abstract":"In this paper the notion of the discrete bipolar pan-integral is introduced. This new type of integral is based on bi-capacities. The main properties of the bipolar pan-integral and its relations with the bipolar Choquet integral and the bipolar pseudo-integral are considered. Some illustrative examples are presented.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"5 1","pages":"000301-000304"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84308326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Role of Chatbots in Formal Education 聊天机器人在正规教育中的作用
G. Molnár, Zoltán Szűts
Chatbots appeared in large numbers at the beginning of the current decade. Interactive technology, often combined with artificial intelligence, has rapidly invaded and occupied the world of online chat. Chatbots are not just elements of virtual assistants, but are used by organizations and governments on websites, in applications, and instant messaging platforms to promote products, ideas or services. In this paper, the authors firstly present a theoretical and historical background, then discuss the issues of using chatbots as educational assistants, and finally describe the basic steps and challenges of programming a bot.
聊天机器人在本世纪初大量出现。交互技术,通常与人工智能相结合,已经迅速入侵并占领了在线聊天的世界。聊天机器人不仅是虚拟助手的组成部分,还被组织和政府用于网站、应用程序和即时通讯平台,以推广产品、创意或服务。在本文中,作者首先介绍了理论和历史背景,然后讨论了使用聊天机器人作为教育助手的问题,最后描述了机器人编程的基本步骤和挑战。
{"title":"The Role of Chatbots in Formal Education","authors":"G. Molnár, Zoltán Szűts","doi":"10.1109/SISY.2018.8524609","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524609","url":null,"abstract":"Chatbots appeared in large numbers at the beginning of the current decade. Interactive technology, often combined with artificial intelligence, has rapidly invaded and occupied the world of online chat. Chatbots are not just elements of virtual assistants, but are used by organizations and governments on websites, in applications, and instant messaging platforms to promote products, ideas or services. In this paper, the authors firstly present a theoretical and historical background, then discuss the issues of using chatbots as educational assistants, and finally describe the basic steps and challenges of programming a bot.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"10 1","pages":"000197-000202"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78476262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Diaspora Mapping and Collaboration Platform for Expatriates 侨民映射与侨民协作平台
Kincso Tuzes-Boloni, Zsuzsanna Borsay, Csaba Sulyok, Károly Simon
In the current globalized world, it is a frequent phenomenon that people from different regions uproot and move to other countries, working and living there temporarily or long-term. But how could the origin regions follow the actual residency of their habitants, and how could they keep the data of the population up to date? The aim of the E-migrated web application is to measure and dynamically visualize the dispersion of specialists originating from a given country. It also gives the opportunity of interconnecting these people and to create a community, encouraging its users to build relationships and cooperate. It is a virtual link for the professionals originating from a common region, independent of current location. This paper aims to present the E-migrated platform, describing the architecture of the system, mentioning the details of the implementation, the main technologies, tools and methods used during the development process. It presents the functionalities of the application, and demonstrates its behavior, using some case studies.
在当今全球化的世界中,不同地区的人们背井离乡,移居到其他国家或暂时或长期工作和生活是一种常见的现象。但是,原籍地区是如何跟踪其居民的实际居住地的呢?他们又是如何保持人口数据的最新状态的呢?电子迁移web应用程序的目的是测量和动态可视化来自给定国家的专家的分散情况。它还提供了将这些人联系起来并创建一个社区的机会,鼓励其用户建立关系和合作。它是来自共同地区的专业人士的虚拟联系,独立于当前位置。本文旨在介绍电子迁移平台,描述系统的体系结构,介绍系统实现的细节,以及开发过程中使用的主要技术、工具和方法。它通过一些案例研究展示了应用程序的功能,并演示了它的行为。
{"title":"Diaspora Mapping and Collaboration Platform for Expatriates","authors":"Kincso Tuzes-Boloni, Zsuzsanna Borsay, Csaba Sulyok, Károly Simon","doi":"10.1109/SISY.2018.8524836","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524836","url":null,"abstract":"In the current globalized world, it is a frequent phenomenon that people from different regions uproot and move to other countries, working and living there temporarily or long-term. But how could the origin regions follow the actual residency of their habitants, and how could they keep the data of the population up to date? The aim of the E-migrated web application is to measure and dynamically visualize the dispersion of specialists originating from a given country. It also gives the opportunity of interconnecting these people and to create a community, encouraging its users to build relationships and cooperate. It is a virtual link for the professionals originating from a common region, independent of current location. This paper aims to present the E-migrated platform, describing the architecture of the system, mentioning the details of the implementation, the main technologies, tools and methods used during the development process. It presents the functionalities of the application, and demonstrates its behavior, using some case studies.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"35 1","pages":"000027-000032"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88171225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Single-Rate and Two-Rate Neural Control Approaches for Coaxial Rotor/Ducted-Fan TUAV for Situational Awareness Applications 用于态势感知应用的同轴转子/导管风扇TUAV单速率和双速率神经控制方法的比较
A. Pedai, I. Astrov, A. Udal
Paper discusses the modeling and control methodologies of a tactical unmanned aerial vehicle (TUAV) of coaxial rotor type with ducted fan via introduction of two-rate control and neural network methods in order to achieve more stabilized flight control. The effectiveness of the proposed single-rate and two-rate control strategies was illustrated and confirmed by numerical simulations of flight maneuvers using programming environment Simulink for chosen model of TUAV. At that earlier developed decomposition methodologies have been applied and adjusted for the actual unmanned aerial vehicle. As the TUAVs are becoming one of the most important information collection devices for the modern situation awareness (SA) systems, the achieved improvements in stabilization of flight trajectories and relevant energy economy enhancements will help to design better SA systems for search, rescue and situation reconnaissance operations.
本文通过引入双速率控制和神经网络方法,讨论了带导管风扇的同轴旋翼战术无人机的建模和控制方法,以实现更稳定的飞行控制。采用Simulink编程环境对所选模型进行飞行仿真,验证了所提出的单速率和双速率控制策略的有效性。在此之前开发的分解方法已经应用和调整为实际的无人机。由于tuav正在成为现代态势感知(SA)系统中最重要的信息收集设备之一,其在飞行轨迹稳定性和相关能源经济性方面的改进将有助于设计更好的态势感知系统,用于搜索、救援和态势侦察行动。
{"title":"Comparison of Single-Rate and Two-Rate Neural Control Approaches for Coaxial Rotor/Ducted-Fan TUAV for Situational Awareness Applications","authors":"A. Pedai, I. Astrov, A. Udal","doi":"10.1109/SISY.2018.8524720","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524720","url":null,"abstract":"Paper discusses the modeling and control methodologies of a tactical unmanned aerial vehicle (TUAV) of coaxial rotor type with ducted fan via introduction of two-rate control and neural network methods in order to achieve more stabilized flight control. The effectiveness of the proposed single-rate and two-rate control strategies was illustrated and confirmed by numerical simulations of flight maneuvers using programming environment Simulink for chosen model of TUAV. At that earlier developed decomposition methodologies have been applied and adjusted for the actual unmanned aerial vehicle. As the TUAVs are becoming one of the most important information collection devices for the modern situation awareness (SA) systems, the achieved improvements in stabilization of flight trajectories and relevant energy economy enhancements will help to design better SA systems for search, rescue and situation reconnaissance operations.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"4 1","pages":"000063-000068"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91241937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of the Microsoft. Net- and Java-Based Implementation of REST Web Services 微软性能分析。基于Net和java的REST Web服务实现
K. Munonye, P. Martinek
REST APIs could be implemented using Java, Microsoft. Net-based technologies or a PHP framework. This paper compares the performance of REST APIs implemented with Java technologies and Microsoft. Net. Java-based RESTful APIs were implemented using Jersey and deployed on the Apache Tomcat Server. RESTful APIs with the same parameters were implemented also with MS. Net using the. Net Framework 6.0 and were deployed on the Microsoft IIS Server. Performance was evaluated and compared in several test scenarios. The results showed that the. Net API performs better than the Java-based API for the processing of PUT operations. Processing time was 11.6% lower in the case of the. Net API. Contrary the Java-based API gave a better performance for the GET operations by processing 80.36% more records in the same time.
REST api可以使用Java、Microsoft实现。基于。net技术或PHP框架。本文比较了使用Java技术和Microsoft技术实现的REST api的性能。网基于java的RESTful api是使用Jersey实现的,并部署在Apache Tomcat Server上。具有相同参数的RESTful api也在MS. Net中使用。. Net Framework 6.0,部署在Microsoft IIS服务器上。在几个测试场景中对性能进行了评估和比较。结果表明:Net API在处理PUT操作方面比基于java的API性能更好。的情况下,处理时间缩短了11.6%。净API。相反,基于java的API通过在相同时间内多处理80.36%的记录,为GET操作提供了更好的性能。
{"title":"Performance Analysis of the Microsoft. Net- and Java-Based Implementation of REST Web Services","authors":"K. Munonye, P. Martinek","doi":"10.1109/SISY.2018.8524705","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524705","url":null,"abstract":"REST APIs could be implemented using Java, Microsoft. Net-based technologies or a PHP framework. This paper compares the performance of REST APIs implemented with Java technologies and Microsoft. Net. Java-based RESTful APIs were implemented using Jersey and deployed on the Apache Tomcat Server. RESTful APIs with the same parameters were implemented also with MS. Net using the. Net Framework 6.0 and were deployed on the Microsoft IIS Server. Performance was evaluated and compared in several test scenarios. The results showed that the. Net API performs better than the Java-based API for the processing of PUT operations. Processing time was 11.6% lower in the case of the. Net API. Contrary the Java-based API gave a better performance for the GET operations by processing 80.36% more records in the same time.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"119 1","pages":"000191-000196"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88536170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis and Risk Reduction in Operation of Hazardous Programmable Electronic Systems 危险可编程电子系统运行的分析与风险降低
D. Gabriska, M. Ölvecký
Hazardous programmable electronic systems are part of the operating of various industries. The occurrence of unexpected situations or failures in the automated operation environment results in various economic losses as well as possible air pollution or possible health damage. Most of the situations that may affect the work of safety critical systems cause software failures. Therefore, the introduction of hazardous programmable electronic systems into operation is very important for risk analysis, which can contribute to the subsequent reduction of risks.
危险的可编程电子系统是各种工业操作的一部分。在自动化运行环境中发生意外情况或故障,不仅会造成各种经济损失,还可能造成空气污染或健康损害。大多数可能影响安全关键系统工作的情况都会导致软件故障。因此,将危险的可编程电子系统引入运行对风险分析非常重要,这有助于随后降低风险。
{"title":"Analysis and Risk Reduction in Operation of Hazardous Programmable Electronic Systems","authors":"D. Gabriska, M. Ölvecký","doi":"10.1109/SISY.2018.8524642","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524642","url":null,"abstract":"Hazardous programmable electronic systems are part of the operating of various industries. The occurrence of unexpected situations or failures in the automated operation environment results in various economic losses as well as possible air pollution or possible health damage. Most of the situations that may affect the work of safety critical systems cause software failures. Therefore, the introduction of hazardous programmable electronic systems into operation is very important for risk analysis, which can contribute to the subsequent reduction of risks.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"67 1","pages":"000123-000126"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78345110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1