The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The power of big data gives us an unprecedented chance to understand, analyze, and recreate the world, while open data ensures that power be shared and widely exploited. Open and big data has become the emerging topics for researchers and governments. Thus, the related privacy issues also become an emerging urgent problem. In this work, we propose a conceptual framework of privacy weaving pipeline...
Social awareness is the next-generation challenge of aware computing. The ability to understand and manage social signals from the interaction between teacher and students becomes an emergence need for intelligent service on the smart classroom. Social signals like stress, politeness, and disagreement can reveal important feedback to improve the teaching, learning and assessment method in the learning...
In this paper, we propose a prototype of smart furniture for the smart home-a magic mirror table. The proposed system has a camera to capture the viewer's facial expression. By analyzing the expressions, the system is able to determine the emotion of the viewer. If the viewer is in a negative emotion, the system then speaks positive sentences and plays the viewer??s favorite music to alleviate his/her...
Unlike office workplace, home environment emphasizes family atmosphere more than work efficiency. Therefore, the awareness of social emotion between home members becomes an important step for designing intelligent service on the smart home system. By embedding the ability of social-emotion awareness into the mirror table, a magic mirror as the fairytale story told can be realized. We addressed the...
This paper describes the concept about “Smart Door Portal”. From the view of implementation, it based on the gate and cooperates with the home information system to provide smart location service. The idea somewhat likes the web portal which provide a centralized façade for home service. By way of combining virtual and physical door control, the members of home change their way for the home communication...
Information flow and business workflow within an organization are close related. While organizational information infrastructures becomes more and more complex, disasters or accidents usually cause serious damages and losses to organizations and individuals, sometimes even force companies to withdraw from markets. Hence, many organizations consider disaster recovery as an important issue regarding...
In the past few years, social networking websites such as Facebook and Myspace become very popular. The usage rage of social networking websites even exceeds that of Google. Followed by the popularity is many potential networking threats. How to prevent and improve these threats to avoid their expansion has become a major challenge. This paper categorizes social networking websites into three main...
In today's Digital Libraries, mobile devices belong to readers often move from one network to the other frequently. Communications with a fixed support infrastructure may not be suitable for original library applications. Ubiquitous computing environments need to be deployed for new library era. This paper discusses the role of Mobile ad hoc networks (MANET) in the Library. A case study is discussed...
With the rapid development of information, companies in the market in order to create greater competitiveness through new information technology trickled into the new system, but with the new Goumai the server and into the new system, information center gradually space can be used to less and less from the Information Centre as the power consumption will increase significantly, increased air conditioning...
Nursing scheduling problem (NSP) has been verified NP-Complete. The Nursing scheduling is a dynamic process interacting with parties iteratively to reflect the revised expectations and constrained rules. It is an orchestrating process which needs not only the scheduling algorithms and shifting methodologies but also the interaction and coordination. Based on web service orchestration in the NSP domain,...
Remote appliance control is an important vision for the smart home. Even in the next few decades, it is inevitable that conversional appliances and smart appliance will coexist together to help people live better. For this reason, this research proposed a remote control model for the conversional appliances to integrate with smart home environment. In this model, a smart home portal combined with...
Classroom usually has a timetable plate embedded on the wall near the front door. However, the only purpose for displaying classroom's timetable cannot fulfill the future digital classroom requirement. They need more automatic, integrated, and intelligent functionality in the classroom environment. Besides, the vision of future smart classroom is to select sustainable technology solutions that have...
As the development for ubiquitous computing, services for smart home will not only be limited at the household space. The scope of services will stride beyond the geographical constraint, and the service will supports the activities of each home member even out of home. Services based on each home member's schedule will form a type of calendar centered service, that is, a home calendar included all...
Aspect-Oriented Programming (AOP) has been proposed as a technique for improving separation of concerns in software and becomes a popular research topic. The AOP language bindings with implementation framework are generally available which allow you to directly use AOP with several programming languages such as Ruby, Squeak, Smalltalk, C, C++, Java and so on. However, some of popular web application...
In this paper, we propose an UML-based generic format set of intrusion signatures for heterogeneous intrusion detecting systems (IDSs) via analyzing signature formats of three popular IDS products. We also propose an attack signature exchange model of heterogeneous IDSs. With this model, an attack signature generated by one IDS could be adopted by different IDSs easily. The proposed XML-based generic...
Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend is growing. The unsafe coding of web application or the vulnerability of the application itself is yet to be patched result in a high security risk. In addition to white-box testing to examine the source code, black box testing for vulnerability scan or penetration test,...
In response to the diversification and the rapid evolution of business environment, it is a rising tendency that organization needs to adopt some relevant management systems in order to continuously reinforce its information management mechanisms. Meanwhile, the arrangement for introducing any new management system needs to comply with a series of regulatory procedures and standards. In order to exert...
Security Operations Center (SOC) is a unit inside or outside an organization that monitors and deals with information security incidents, on a technical level. In this paper, a trusted security incident information sharing mechanism among SOCs is proposed. The information needed to share among SOCs to prevent incident dispersions usually were just the time of occurrence, origin of attack, consequence,...
Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit...
The encrypting PIN pad (EPP) is one common interface used to verify the authentications for such as access control management, automatic teller machine (ATM), etc. by entering personal identification number (PIN). However, the strength of the passwords composed of ten candidate digits is less than 30% of with alphanumeric inputs by additional 26 English alphabet letters. This paper proposes an alternative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.