The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Measurement of respiration rate is very important in the field of medical. Now a days bioimpedance has been used in many of the medical applications. Breath rate monitoring with good battery life is not yet available for continuous monitoring. Challenge includes making the system easily wearable, reducing noise level, good accuracy, good battery life and cost effective. The objective of this work...
Internet based enterprise level collaboration tools enable organizations to make decisions faster and more accurately with less effort. However, these tools provide limited real-time group collaboration within and across organizations. Multicast protocols were developed to provide efficient group communication. This paper proposes a novel IP multicast network layer filter architecture that provides...
The success of social software depends on contributions made by two key entities; the infrastructure provider(s) and the content providers (users). Currently, social software providers do not possess a powerful and generic approach to measure the contributions of their users. The ability of measuring user contributions will allow social software providers to accurately identify, acknowledge and reward...
The Web has dramatically changed the way we express opinions on certain products that we have purchased and used, or for services that we have received in the various industries. Opinions and reviews can be easily posted on the Web, such as in merchant sites, review portals, blogs, Internet forums, and much more. These data are commonly referred to as user-generated content or user-generated media...
Spammers are always looking for new ways to bypass filters and spread spam content. Currently, spammers have not only improved their spam methods but have also moved towards exploiting software security vulnerabilities in order to spread their spam content. Spammers use weaknesses inside Web applications to inject their spam content into legitimate Web sites, redirect users to their own campaign,...
E-learning has sprung up much interest in corporations, educational institutions and individuals alike. Recently, it has been discovered that emotion can affect the e-learning experience. However, understanding the emotional reaction of a student in a complicated learning environment is a mind boggling task. By detecting intense emotional experiences being exhibited by students, we intend to detect...
Wireless Multimedia Sensor Networks (WMSNs) is comprised of small embedded video motes capable of extracting the surrounding environmental information, locally processing it and then wirelessly transmitting it to parent node or sink. It is comprised of video sensor, digital signal processing unit and digital radio interface. In this paper we have surveyed existing WMSN hardware and communication protocol...
Spammers have proven very powerfully adaptable, if we thwart all current spam methods, they will find new loophole to use them. Blogs, comments, forums, opinions, online communities, wikis and tags are nowadays targets for their campaigns. This paper presents analysis of current anti-spam methods in Web 2.0 for spam detection and prevention against our proposed evaluation framework. The framework...
Pharmaceutical and healthcare industries are highly regulated industries in each and every nation around the globe. Every nation has a governing body like USFDA, TGA, and M.H.R.A, Schedule-M etc. that assures that the medicines are manufactured under strict guidelines to ensure highest quality of manufactured products. However assuring high quality products requires that the manufacturing facility...
Wireless sensor networks (WSN), an element of pervasive computing, are presently being used on a large scale to monitor real-time environmental status. However these sensors operate under extreme energy constraints and are designed by keeping an application in mind. Designing a new wireless sensor node is extremely challenging task and involves assessing a number of different parameters required by...
This paper critically evaluates existing work, presents an opinion mining framework and exposes new areas of research in opinion mining. Individuals, businesses and government can now easily know the general opinion prevailing on a product, company or public policy. At the core of this field is semantic orientation of subjective terms in documents or reviews which seeks to establish their contextual...
Online advertising has emerged as one of the major business models on the Internet. Publishers rely on the online revenue generated from advertising to offer many free services. However, it has become evident that online advertisements are now becoming quite intrusive and also consume a lot of valuable bandwidth to download zero-caching ads and flash or video ads. As a result many users are now using...
RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in...
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of software security that is not covered in the design phase of software development life-cycle resulting in many security vulnerabilities. Our objective is to extend UML to new integrated framework for model driven security engineering...
RFID, Radio Frequency Identification Systems, have gains its popularity for automated identification and supply chain applications. This paper describes the technical fundamentals of RFID systems, recent technical research on the problems of privacy/security and some security proposals are presented for this new radio technology i.e. RFID.
Reliability, security and privacy are the key concerns with RFID (radio frequency identification) adoption. While the mainstream RFID research is focused on solving the security and privacy issues, this paper focuses on addressing the reliability issues in general and detecting read rate failures in particular. We specifically consider the issue of detecting if some RFID tags are not read at all,...
Image retrieval (IR) is one of the most exciting and fastest growing research domains in the field of multimedia technology. And in the industrial ecosystems, images of products, activities, marketing materials etc are needed to be managed and fetched in an efficient way to support and facilitate business processes. Current techniques for IR including keyword based, content based and ontology based...
The development of information technology has eased the medical services and provided the electronic health service in a way that a doctor can keep the records of patients in an information system and be informed of changes of status of patients, and make decisions promptly. However, there are increasing challenges over the privacy of patients due to the exposition of clinic information patients to...
Security is one major issue with RFID technology. Mainstream research in RFID security addresses the following security properties i.e. anonymity, confidentiality and authenticity, however it does not cater for integrity. In this paper we consider the fourth security property i.e. integrity. We try to solve the issue of data recovery after RFID data has been tampered. To address this issue, we present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.