The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Intrusion Detection Systems (NIDSs) play a crucial role in detecting malicious activities within the networks. Basically, an NIDS monitors network flows and compares it with the pre-defined suspicious patterns. To be effective, different intrusion detection algorithms and packet capturing methods have been implemented. With rapidly increasing network speeds, NIDSs face a challenging problem...
The emergence of New Data Sources (NDS) in healthcare is revolutionising traditional electronic health records in terms of data availability, storage, and access. Increasingly, clinicians are using NDS to build a virtual holistic image of a patients health condition. This research is focused on a review and analysis of the current legislation and privacy rules available for healthcare professionals...
A Content Delivery Network (CDN) is a distributed system composed of a large number of nodes that allows users to request objects from nearby nodes. CDN not only reduces the end-to-end latency on the user side but also offloads Content Providers (CPs) providing resilience against Distributed Denial of Service (DDoS) attacks. However, by caching objects and processing users' requests, CDN service providers...
In this paper, the effects of the human body, bandage, and moisture on the performance of passive UHF RFID tags is analyzed. The tags used for measurements include a commercially available RFID tag and tags developed on paper and rayon bandage substrates, using brush-painted conductive silver ink. In order to evaluate the tags' performance, wireless measurements are done on different body parts, when...
A fully wireless implantable system can be used for long-term monitoring of intracranial pressure. In this type of system, an implant is placed under the skull and monitored pressure is transmitted wirelessly outside the skull. Moreover, the implant is powered through an inductive coupling. To avoid any infection and damage to the implant, the implant should be coated with biocompatible material....
An implantable pressure monitoring system is a compelling approach to home monitoring of intracranial pressure in the long term. In our approach, an on-body unit powers a cranially concealed system where a piezoresistive element senses the pressure. A data transmission unit built in the same platform emits a signal at a pressure dependent frequency through a miniature far field antenna. In this work,...
Searchable Symmetric Encryption (SSE) allows users to execute encrypted queries over encrypted databases. A large number of SSE schemes have been proposed in the literature. However, most of them leak a significant amount of information that could lead to inference attacks. In this work, we propose an SSE scheme for a Privacy-preserving Multi-cloud encrypted Database (P-McDb), which aims at preventing...
Device-to-Device (D2D) communication has emerged as a new technology, which minimizes data transmission in radio access networks by leveraging direct interaction between nearby mobile devices. D2D communication has a great potential in solving the capacity bottleneck problem of cellular networks by offloading cellular traffic of proximity-based applications to D2D links. This provides several benefits...
The increasing amount of space debris is a big threat for satellite operations in low Earth orbit. Over the last few decades, there are more than thousand active satellites working in orbit. They have been producing a lot of different sized debris and thus causing increased debris density in the orbit. Since the starting of space operation, debris has been being produced significantly. Thus operation...
The investigation of dynamic behavior of aerospace structures is a challenging task due to the interaction of different types of aerodynamic and structural parameters. The identification of operational loads is essential for accurate investigation of the fatigue life especially in case of composite structures. In the present work, a mixed experimental and numerical approach is used for indirect identification...
Although outsourcing data to the cloud has many advantages, cloud computing introduces new privacy and security requirements on how data is stored and accessed. To ensure data confidentiality, use of encryption is a common strategy. A problem with this strategy is that for large data it becomes difficult to access and update data, and to ensure data integrity and data provenance without decrypting...
Extreme learning machine (ELM) and support vector machine (SVM) classifiers are developed to detect rales (a gurgling sound that is a symptom of respiratory diseases in poultry). These classifiers operate on Mel-scaled spectral features calculated from recordings of healthy and sick chickens during a vaccine trial. Twenty minutes of labeled data were used to train and test the classifiers, then they...
Nowadays, governmental and non-governmental health organisations and insurance companies invest in integrating an individual's genetic information to their daily practices. In this paper, we focus on an emerging area of genome analysis, called Disease Susceptibility (DS), from which an individual's susceptibility to a disease is calculated by using her genetic information. Recent work by Danezis et...
K-nearest neighbor (k-NN) classifier can learn non-linear decision surface and requires only one hyperparameter (i.e. value of “k”) for training. The classification accuracy improves as we increase the amount of training data. With an increase in the amount of training data, computational and memory requirements also increases as it has to store and search through the entire training data for classification...
There is a growing interest in IoT-enabled smart buildings. However, the storage and analysis of large amount of high-speed real-time smart building data is a challenging task. There are a number of contemporary Big Data management technologies and advanced analytics techniques that can be used to deal with this challenge. There is a need for an integrated IoT Big Data Analytics (IBDA) framework to...
Increasing demands of accuracy, productivity, reliability and repeatability in today's robotic applications have highlighted significance of modern control techniques. The associated control law must be able to handle perturbation forces, joint friction and parameter variations which can degrade the robot performance. This paper proposes non-linear Sliding Mode Control (SMC) for a 6 Degree of Freedom...
In this paper, design and development of a self-sufficient sentry robotic gun is presented. Professional robotic assemblies which are generally developed for security purposes are targeted toward high efficiency and are based on extensive control algorithms. This makes them quite expensive and infeasible for low budget applications. One important component of such systems is that of motion detection...
In the Public Key infrastructure (PKI) model, digital certificates play a vital role in securing online communication. Communicating parties exchange and validate these certificates, the validation fails if a certificate has been revoked. In this paper we propose the Certificate Revocation Guard (CRG) to efficiently check certificate revocation while minimising bandwidth, latency and storage overheads...
This paper presents a washing reliability study of passive UHF RFID textile tags with three different coating materials. The tag antennas were fabricated by brush-painting silver ink on a 100 % cotton fabric. After attaching the ICs, the ready RFID tags were fully coated with three different protective coating materials: regular textile glue, epoxy coating, and silicone rubber. The coated tags were...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.