The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Following the trend of privacy preserving online social network publishing, various anonymization mechanisms have been designed and employed. Many differential privacybased mechanisms claim that they can preserve the utility as well as guarantee the privacy. Their utility analysis are always based on some specifically chosen metrics.This paper aims to find a novel angle that describing the network...
When configuring a delay tolerant network (DTN), there are many aspects that need to be taken into consideration for an effective and efficient network. One aspect is a buffer management strategy. Buffer strategies are used to determine which packets need to be forwarded or dropped. This paper will focus on the variety of buffer management strategies available, providing a comprehensive survey and...
As technology improves in size and the number of smart devices increases, security in personal devices undoubtedly becomes an important aspect of today's life. However, the complexity in hardware and software systems expose vulnerabilities in security. Vulnerabilities may exist in many layers of systems and would require a specific inputs or events to trigger it. Discovery of vulnerabilities require...
Research conducted in the field of localization with passive light, or using the intrinsic properties of light to determine a person's location, has seen increased growth in recent years. Specifically, fluorescent lights have been shown to exhibit distinct frequencies which can be recorded, along with their positions, for future lookup and positioning. Developments have been made in utilizing this...
In this paper, we introduce a defensive cybersecurity framework called Cybergrenade automating various penetration testing tools to sequentially exploit machines connected to a single local network, all underneath a single application running on a Single-Board Computer (SBC). This takes advantage of the SBC's unique capabilities in a way that manual exploitation simply cannot match. Currently, while...
With the extensive use of smartphones, technology improving secure communication between smartphones is a growing field of research. As a form of Visible Light Communication, a color video barcode system creates a smartphone-tosmartphone communication channel. This color video barcode system, effectively an evolved form of QR codes, provides a secure alternative to WiFi, Bluetooth, and Near Field...
Real-time ridesharing systems have been investigated as a potential method for improving congestions in overloaded road networks. In this paper, we specifically investigate integrating dynamic road conditions (DRCs) such as traffic accidents into the ridesharing systems, as the DRCs will cause unexpected delays during the route planning phase. We propose to use the CRP framework due to its capability...
In recent years, the PM2.5 (particulate matter with a mean aerodynamic diameter of 2.5 micrometers or less) pollution has become a very serious problem in China. Currently, there are three types of monitoring approaches: government-led monitoring, Wireless Sensor Networks (WSN) approaches and Participatory Urban Sensing (PUS). There are three limitations in these state-of-the-art research approaches:...
Millimeter wave (mmWave) communication is a key enabling technology for 5G cellular systems. However, due to mmWave propagation characteristics, link length for very high rates is limited and will likely necessitate the use of relay nodes for longer-range ultra-high-speed backhaul communications. This paper investigates relay selection and scheduling to support high end-to-end throughput in mmWave...
Transmitting large amounts of data such as videos underwater is an important yet challenging problem in the harsh underwater environment in which radio-frequency waves are absorbed for distances above a few tens of meters, optical waves require narrow laser beams and suffer from scattering and ocean wave motion, and acoustic waves—while being able to propagate up to several tens of kilometers—lead...
Millimeter-wave communication in 60 GHz band is considered a promising technology to meet the explosive growth of data demand in Wi-Fi based WLAN. To address potential blockage for 60 GHz signals, multiple APs are proposed for such WLAN. This paper addresses the important problem of AP assignment and transmission scheduling for a multi-AP 60 GHz WLAN. We propose two AP assignment schemes with different...
In cellular networks, tail states are designed for a tradeoff between energy efficiency and latency. However, the energy consumed during tail states becomes a huge energy drainer itself. Traditional energy saving techniques by content prefetching cannot be directly applied to mobile ads, due to the deadline requirements of ads, randomness in user behaviors, different usage patterns of mobile apps...
Delay Tolerant Networks (DTNs) differ from the traditional Mobile Ad Hoc networks (MANETs) in that DTNs are not always interconnected. The issue of routing data in a DTN is considered here. Many routing protocols exist for DTNs. Some are based on comparing nodes to each other, whereas others focus on the internal properties of the messages they hold. There are wide ranges of protocols, and they perform...
Mobile devices now rival desktop computers as a method of web browsing. Even so, many web applications are still designed with the desktop setting in mind. As screen sizes of mobile devices continue to get larger, operating smartphones single-handedly becomes increasingly difficult. This paper explores the possibility of automatic operating hand detection by capturing users' touch traces during normal...
Social media plays an important role in shaping the beliefs and sentiments of an audience regarding an event. A comparison between public data sets that have holistic features and social media data set that include more user features would give insight into the spread of misinformation and aspects of events that are reflected in user behavior. In this research, we compare the trends identified in...
Smartphone carrier companies rely on mobile networks for keeping an accurate record of customer data usage for billing purposes. In this paper, we present a vulnerability that allows an attacker to force the victim's smartphone to consume data through the cellular network by starting the data download on the victim's cell phone without the victim's knowledge. The attack is based on switching the victim's...
We present a novel angle based indoor localization approach which exploits the directivity property of the smart antenna array at both transmitter and receiver sides. In contrast to conventional AOA based localization approaches, our system combines using beam steering transmitting and receiving approach to mitigate the effect of indoor multipath propagation. By setting the receiver beamforming weights,...
In industrial applications synchronized sensor nodes are vital for many tasks like multi parameter sampling of complex machinery behavior. The wirelessly connected nodes are usually synchronized to a base station. Therefore, frequency or period estimation of the reference clock is a key issue for all connected tasks like sampling, localization or applying energy optimized communication protocols....
Dancing is always challenging especially for beginners who may lack sense of rhythm. Salsa, as a popular style of dancing, is even harder to learn due to its unique overlapped rhythmic patterns made by different Latin instruments (e.g., Clave sticks, Conga drums, Timbale drums) together. In order to dance in synchronization with the Salsa beats, the beginners always need prompts (e.g., beat counting...
Existence of several application specific network technologies like Sensor Networks, Cloud, Personal Area Networks (WPANs), Vehicular Networks (VANETs), Content Delivery Networks and Wifi operating oblivious to each other in the same ISM band creates numerous problems like contention for the same bandwidth leading to excessive collisions and hence lower throughput. This calls for a hybrid mesh framework...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.