The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Detecting students' attention in class provides key information to teachers to capture and retain students' attention. Traditionally, such information is collected manually by human observers. Wearable devices, which have received a lot of attention recently, are rarely discussed in this field. In view of this, we propose a multimodal system which integrates a head-motion module, a pen-motion module,...
Rapid advances in wireless communication technologies have paved the way for a wide range of mobile devices to become increasingly ubiquitous and popular. Mobile devices enable anytime, anywhere access to the Internet. The fast growth of many types of mobile services used by various users has made the traditional single-server architecture inefficient in terms of its functional requirements. To ensure...
In recent years, Cloud computing has become increasingly popular. Many companies have replaced traditional hosting to cloud hosting. Cloud providers are responsible for tenant isolation, if a tenant (virtual machine) is infected, other tenants will be affected. Because the virtual network environment is very complex, the traditional intrusion detection systems can only detect attacks from external...
With the ever increasing demand on computational and storage resources to deal with tremendous growth of big data, clients tend to outsource their data mining tasks to cloud service providers. Nevertheless, concerns of data integrity, security and privacy are also on the rise: how can the clients with weak computational power verify the integrity of mining results returned by the server while preserving...
Database as a service (DaaS) is a new paradigm based on the cloud computing platform. With the growing concerns on privacy, the user shope to have a security manner to store their data in the cloud. In order to improve the privacy protecting method for the sensitive data shared in the cloud, this paper proposes a privacy-preserving access control protocol based on multi-levels access control, Feldman...
In the wake of the rapid development of internet, the information security issue brought about by the internet has been increasingly prominent, e.g. data leakage and hacker attack. Despite that many protective measures have been proposed to solve those issues, such as building firewall, applying for secure routing technology and installing antivirus programs, those measures are unable to ensure the...
Cloud computing is a new method of shared infrastructure, it can provide supercomputing services. At the same time, WebGIS is the integration product of GIS and internet technologies, and it is inexorable trend with the development of GIS. The emergence of cloud computing brings new opportunities for WebGIS. This paper first introduced the principles of cloud computing and WebGIS, and then introduced...
Traditional e-commerce transactions limited to producers through a third party and consumers, manufacturers rarely communicate directly with consumers. The system is adapted to this need. Virtual factory communication platform of producers and consumers are proposed. The paper presents the development of online virtual factory based on database and order design. The experiments show virtual operation...
We demonstrate a system that monitors the taxi availability at taxi stands by mining real-time taxi trajectory data streams. The system includes a server-side trajectory data stream processing and mining program and a client-side mobile application for Android smart phones. The server program continuously monitors for each taxi stand the numbers of taxis queueing at the taxi stand, the numbers of...
With the development of internet and information technology network security has become the hot spots of computer science. Effective monitoring operational status of every equipment is very important in the Local Area Network (LAN). This paper studies key techniques for monitoring LAN, such as process automatic loading and hidden, network covert communications, network data secure transmission, to...
The multi-domain virtual environment is an important research area of the distributed virtual reality. However, frequent interaction, great quantity of messages and the discrepant need of each individual simulation domain resulted in numerous redundant messages. In this paper, we propose a Publish/Subscribe based correlative matching method for multi-domain virtual environment. This method focus on...
Online Social Networks (OSNs) are more and more popular recently, people may through them interact with each other for the purpose of social intercourse. The client/server OSN architecture brings about the bottleneck of bandwidth and computation. It leads to the scalability problem and the communication latency increases as users grows. This paper proposes a bandwidth- and latency-aware peer-to-peer...
Power consumption is an essentially important issue and an interesting challenge to prolong the lifetime of wireless sensor network (WSN). Sensors closer to a sink node have a larger forwarding traffic burden and consume more energy than nodes further away from the sink. The whole operational lifetime of WSN is deteriorated because of such an uneven node power consumption patterns, leading to what...
A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larger forwarding traffic burden and consume more energy than nodes further away from the sink. The whole lifetime of WSN is deteriorated because of such an uneven node power consumption patterns, leading to what is known as...
Insect pests and diseases are major constraints to crop yield. Solutions to pests and diseases management are inevitably not independent of location. In the current study, a web-base geographic information system for crop pests and diseases management system was developed using ArcIMS, ASP.NET, networking and database management technologies. The application system provides client users with pests...
With the rapid development of broadband networks and multimedia technologies, P2P video-on-demand service is increasingly gaining popularity over the past few years. However, little work has been done on an important design issue for P2P video-on-demand systems, i.e., determining the maximal service capacity of a system. In this paper, we first propose an optimal rate allocation scheme to maximize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.