The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a method to reconstruct the three-dimensional aspects of underwater objects using side-scan sonar images. The sonar images are segmented into three kinds of regions: echo, shadow and background. A two-dimensional intensity map is estimated from the echoes and a two-dimensional depth map is computed from the shadow information. With the transformation model, the final reconstruction...
The conventional security systems require to have an intelligent and integrated security technology that can analyze network and system events using large-capacity data of various security sources. In order to detect the cyber threats and enable intelligent ways of correlation analysis among security data, the paper develops and deploys the Big Data platform which can provide to collect, process and...
LoRa, an emerging wireless technology, is examined for long range communication performance in a large area. Although LoRa shows good performance for long-distance transmission in the countryside, its radio signals can be attenuated and interfered with by buildings, trees and other signal sources. In urban areas, our observation shows that LoRa requires a dense deployment of LoRa gateways to ensure...
Despite the advent of numerous Internet-of-Things (IoT) applications, recent research demonstrates potential side-channel vulnerabilities exploiting sensors which are used for event and environment monitoring. In this paper, we propose a new side-channel attack, where a network of distributed non-acoustic sensors can be exploited by an attacker to launch an eavesdropping attack by reconstructing intelligible...
This paper proposes an underwater visual simultaneous localization and mapping system using a stereo camera. In front-end, the image data is used to execute feature detection and matching. And the vehicle motion is estimated by the feature matching result. In back-end, a global optimization method represented by a graph, is used to eliminate the errors. The mapping result is in the from 3-D point...
A hybrid power amplifier (PAhybrid), combining class-D and class-AB amplifier is demonstrated. As a specific structure for class-D, 3-level and 3-phase (3P3L) techniques are applied to reduce the current ripple to 1/12th of that of standard 2-level class-D amplifier. At the same time, the effective switching frequency increases by 6 times. Compared to the previous works which use several uH inductors,...
Service virtualization is an approach that uses virtualizedenvironments to automatically test enterprise services inproduction-like conditions. Many techniques have been proposedto provide such a realistic environment for enterprise services. The Internet-of-Things (IoT) is an emerging field which connectsa diverse set of devices over different transport layers, usinga variety of protocols. Provisioning...
Due to the popularity of context-aware computingand the rapid growth of the smart phone devices, modeling anindividual's phone call response behavior may assist them intheir daily activities for managing call interruptions. A key stepof such modeling is to discovering call response behavioral rulesbased on multi-dimensional contexts related to individual'sbehavior. Currently, researchers use classification...
Recently, the advent of 3D printers has enabled people to produce a lot of inexpensive and obtainable prosthetics. In addition to that, various sensors have also been developed and used to give intelligent functions to the prosthetics. However, there may be cases where the number of sensors attached to the prosthetics should be limited due to cost, limited space, or power issues as the number of sensors...
Large enterprise software systems make many complex interactions with other services in their environment. Developing and testing for production-like conditions is therefore a very challenging task. Current approaches include emulation of dependent services using either explicit modelling or record-and-replay approaches. Models require deep knowledge of the target services while record-and-replay...
Service virtualisation is a supporting tool for DevOps to generate interactive service models of dependency systems on which a system-under-test relies. These service models allow applications under development to be continuously tested against production-like conditions. Generating these virtual service models requires expert knowledge of the service protocol, which may not always be available. However,...
Constructing testbeds for systems which are interconnected with large networks of other software services is a challenging task. It is particularly difficult to create testbeds facilitating evaluation of the non-functional qualities of a system, such as scalability, that can be expected in production deployments. Software service emulation is an approach for creating such testbeds where service behaviour...
In order to improve the accuracy of recognition insulators and effectively reduce the influence caused by the texture and illumination of the background, a novel insulator recognition method merged the shape, color and texture of insulator is presented. Firstly, the parallel line features were perceived from different directions in the inspection images as candidates of insulator regions, and then...
With the convergence of pervasive mobile computing and social networking, interest has grown significantly in software systems and applications that are aware of users' social context to make pervasive applications more intelligent and accessible. Thus, socially-aware systems have further advanced context-aware systems taking account of human social context such as social relationships to enable the...
This study presents a polymer-coated hollow-core-fiber-Fabry-Perot interferometer to measure liquid level. Wavelength shift of interference fringes of the proposed device exhibits linear response corresponding to the liquid level with a high sensitivity of −0.446nm/cm.
This paper proposes a fast access scheme to meet delay requirement for the wireless Medium Access Control (MAC) protocols to support the Quality of Service (QoS) requirements of real-time applications. Our scheme deals with access requests in different ways depending on their delay requirements. In our scheme, a Collision Resolution Period (CRP) is used to quickly resolve collisions for the delay...
Service composition is becoming the dominant paradigm for developing Web service applications. It is important to ensure that a service composition complies with the requirements for the application. A rigorous compliance checking approach usually needs the requirements being specified in property specification formalisms such as temporal logics, which are difficult for ordinary software practitioners...
An Ethernet Passive Optical Network (EPON) is a point-to-multipoint optical network and requires security services between the Optical Line Terminal (OLT) and the Optical Network Units (ONUs). In this paper, we propose an efficient key management scheme by integrating the Rivest-Shamir-Adleman (RSA) public key algorithm and the GATE operation of Multi-Point Control Protocol (MPCP). As EPON has some...
Enterprise software systems play an essential role in an organization’s business operation. Many business rules and regulations governing an organization’s operation can be translated into quality requirements of the relevant software systems, such as security, availability, and manageability. For systems implemented using Web Services, the specification and management of these qualities in the form...
The electronic calendar usually serves as a personal organizer and is a valuable resource for managing daily activities or schedules of the users. Naturally, a calendar provides various contextual information about individual's scheduled events/appointments, e.g., meeting. A number of researchers have utilized such information to predict human behavior for mobile communication, by assuming a predefined...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.