The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, more and more companies intend to combine public transport system with the mature Wi-Fi technology to bring more passengers value-added services during their travel. It is critical to mobile service market and city management by identify the user's behavior patterns. In this paper, the author firstly analyzes the time regularity of bus Wi-Fi network behavior. Then from the perspective of...
As the increasing number of intelligent mobile phones that are available for people which lead to tones of network flow data are produced. Hence, how to dig the user's behavior pattern by using the data collected form mobile phones is a significant problem. While some achievements have been made in this area, it is still too complicated to be put into practice due to various conditions needed by traditional...
The developments of Information and Communication Technology (ICT) and Internet of Things (IoT) are being used to enhance quality, performance and interactivity of urban services. Benefited from the widespread adoption of mobile devices, we can collect amount of mobile data for user mobility analysis. Mining hidden information from users' mobile data is important for builders of smart city to provide...
The explosive usage of mobile devices enables conducting electronic transactions involving direct E-signature on such devices. Thus, user signature verification becomes critical to ensure the success deployment of online transactions such as approving legal documents and authenticating financial transactions. Existing approaches mainly focus on user verification targeting the unlocking of mobile devices...
In this paper, we firstly introduce theory of magnetic coupling. Then, the shielding-effectiveness based electromagnetic shielding theory is studied, and the effectiveness of shielding materials to the coupling process is analysed in mobile payment systems. Simulation results show that when the feed frequency is low, plastic and lithium cell cause almost no attenuation to the magnetic field. If a...
Real-time parking availability information is important in urban areas, and if available could reduce congestion, pollution, and gas consumption. In this paper, we present a software solution called PhonePark for detecting the availability of on-street parking spaces. The solution uses the GPS and/or accelerometer sensors in a traveler's mobile phone to automatically detect when and where the traveler...
Community association is an important attribute of a social network because people may belong to varying groups with different characteristics at different times. Traditional community detection approaches often rely on a centralized server and are only useful for offline data analysis. In this paper, we propose and evaluate a distributed community detection approach that allows individual users to...
New mobile phones equipped with multiple sensors provide users with the ability to sense the world at a microscopic level. The collected mobile sensing data can be comprehensive enough to be mined not only for the understanding of human behaviors but also for supporting multiple applications ranging from monitoring/tracking, to medical, emergency and military applications. In this work, we investigate...
Received Signal Strength (RSS) based localization algorithms are sensitive to a set of non-cryptographic attacks. For example, the attacker can perform signal strength attacks by placing an absorbing or reflecting material around a wireless device to modify its RSS readings. In this work, we first formulate the all-around signal strength attacks, where similar attacks are launched towards all landmarks,...
In this paper, we consider the problem of tracking fine-grained speeds variations of vehicles using signal strength traces from GSM enabled phones. Existing speed estimation techniques using mobile phone signals can provide longer-term speed averages but cannot track short-term speed variations. Understanding short-term speed variations, however, is important in a variety of traffic engineering applications-for...
Based on the analysis of the defects of the two popular E -business models currently used, and the study of the needs of current Chinese companies, the paper proposed a new B2B E -business model based onP2P. This paper discussed the architecture, information flow and key technologies of the new model, together with the structure of the market constructed on this model. It states that, given the incomplete...
The location information is critical for many location-aware applications and services. Recent efforts have resulted in a plethora of techniques to localize wireless devices. However, with the availability of the location information, privacy concerns are raised: by whom and when should the location information be accessed? In order to provide trusted access to the location information, in this work,...
We present the DECODE technique to determine from a remote receiver whether a set of transmitters are co-moving, i.e., moving together in close proximity. Co-movement information can find use in applications ranging from inventory tracking, to social network sensing, and to optimizing mobile device localization. DECODE detects co-moving transmitters by identifying correlations in communication signal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.