The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart video surveillance systems are essentials in modern environments to ensure safety and security for lives and property. In order to capture critical clues of reconnaissance, it is important to automatically and dynamically control the surveillance sensitivity and quality for detecting abnormal/suspicious events to perform high quality monitoring. In this work, we design a smart video surveillance...
In mobile communication, messages are delivered via the air. This may attract hackers to eavesdrop and then break them. Hence, the security is an important issue needed to be addressed. Advanced Standard Encryption (AES) is currently a frequently used encryption approach. However, AES will be insecure in the near future since it has been partially solved. Therefore, in this paper, we present a security...
In this paper, we propose the wireless shopping scheme, called the Secure Mobile Shopping System (SMoSS for short), which is a secure and convenient wireless shopping environment, and in which we can safely create and perform our credit-card transaction by coordinating the cash flow of a trading system and credit card entities, without requiring additional restrictions and resources on the cash flow...
Three-party authenticated key exchange protocol is designed for securing the communication between two users with the help of a trusted server. The users can encrypt data with the exchanged secret keys and then transmit the cipher text to each other. However, the inefficiency, unreliability, and inflexibility problems that can be found in many previous studies should be solved. Therefore, in this...
This paper presents the development of an Android Application Server for Mobile Platforms (AASMP). It is motivated by the widespread cloud computing and the popularity of mobile platforms, such as smartphones and tablet computers, running Android system. The main purposes of developing this AASMP include: to allow deploying Android applications on a server to be accessed by client-side users, not...
This paper investigates the construction and control of a robot arm which mimics human arm's pitching motion. In order for the robot to have the vision capability, like a human pitcher, a CCD webcam is added to capture target image. After image processing and analysis, controller can compute and then issue the motion commands to the robot arm motors. The vision system helps promote system's intelligence...
Location service provides position of mobile destination to source node so that position based routing can be applied. Several quorum-based location services have been proposed. These location service protocols suffer from complex structure with high overhead, or host location foreknowledge, and difficulty in quorum construction. To overcome those deficiencies, we propose a novel quorum-based location...
Location service provides position of mobile destination to source node so that position based routing can be applied. Several quorum-based location services have been proposed. These location service protocols suffer from complex structure with high overhead, or host location foreknowledge, and difficulty in quorum construction. To overcome those deficiencies, we propose a novel quorum-based location...
With the increasing demand for realtime multicast service in mobile wireless sensor networks (mWSN), it is needed to provide new rendezvous point (RP) selection schemes for mWSN. Due to the arbitrary node mobility in mWSN, where mobile nodes usually go beyond someone RPpsilas coverage, multicast algorithm requires not only end-to-end constrained latency, but also short RP-switch time and low routing...
A brain-computer interface (BCI) is a communication system that helps locked-in patients to communicate with other people by translating brain activities into machine/computer commands. This paper introduces a BCI instant messaging system (i.e. BCI messenger), which is further work of the P300-based Chinese typewriter developed in the preceding research. The BCI messenger can serve as a daily communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.