The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Active scanning (AS) is a mechanism provided by the 802.11 standard by which WiFi clients proactively search for access points (APs) in their vicinity. To do so, a client sends out a probe request, in response to which all APs that hear the request send a probe response. Prior works have reported severe degradation in performance of WiFi networks due to excessive AS. In practice, a client triggers...
WiFi-based indoor localization is a complex problem due to high variations of radio frequency (RF) signals in indoor environment. Many popular techniques based on RF fingerprinting require an extensive site survey, which involves time intensive logging of Received Signal Strength (RSS). This paper presents CAIL, a smartphone-based indoor localization system, that utilizes the site survey done by a...
A vast researches are concentrated towards the development of EEG based human computer interface to enhance the quality of life for medical applications. There is a recent attraction to wireless EEG devices as they are cheaper and easily available in the market. The devices use dry electrodes and send signals via wireless, thus are easier to use and more comfortable to wear. Such technology can be...
We look at the problem of using accelerometer in smartphones to detect mobility activities of users. The activities are internally composed of several simple activities. One can perform the task of distinguishing the activities using classic classification techniques with two different data representations namely, statistical features and ECDF-based features. Our recommendation in this paper is to...
There are smart apps to track our liquid intake and remind us to drink whenever we fall short of our target. However, these apps either require a specialized container or manual input from the user. They cannot account for spilled liquid or liquid consumed by other people. We propose an app, which allows user to use a container of his choice. It consists of a detachable container base, which houses...
With the advent of the Internet of Things (IoT), privacy and security of sensitive data has become a major concern. In general, sensors which are the enablers for IoT, send the sensed data to a cloud database over the internet. The communication to the cloud database may be compromised by an adversary, or the database maybe accessed by a curious database administrator, thereby raising security concerns...
This paper is based on the waterlogging problems caused in the metropolitan cities. The people in their day to day life suffer due to the increasing commotion caused by the same. This automated water removal method is used to reduce waterlogging and people will be intimated about traffic caused by it in that particular area using website portal or an android application. It is proposed to reduce the...
Project ExScal (for Extreme Scale) fielded a 1000+ node wireless sensor network and a 200+ node ad hoc network of 802.11 devices in a 1.3km by 300m remote area in Florida during December 2004. In several respects, these networks are likely the largest deployed networks of either type to date. We overview here the key requirements of the project, describe briefly how they were met and experimentally...
ExScal (for Extreme Scale) project deployed a 1,000+mote network and a 200+peer-to-peer ad-hoc 802.11b network of stargates in a 1.3km by 200m remote area in Florida, USA during December 2004. In comparison with deployments of networks of mote and stargate-class devices fielded to date, the ExScal application remains relatively complex and large in size. The goal of the project was to deploy a dense...
Dynamics of wireless communication, resource constraints, and application diversity pose significant challenges to data transport control in wireless sensor networks. In this chapter, we examine the issue of data transport control in the context of two typical communication patterns in wireless sensor networks: convergecast and broadcast. We study the similarity and differences of data transport control...
Mobile technology is revolutionizing the way companies do business, by improving business processes, increasing productivity and enhancing customer experience. Hence the need to manage/monitor the mobile phones has never been higher. Simple Networking Management Protocol (SNMP), is an internet standard protocol for managing IP devices on a network. Devices that typically support SNMP include routers,...
IEEE 802.11 WLAN (Wireless or WiFi LAN) clients discover neighboring APs (Access Points) by active or passive scanning. Such an active scan of WLAN injects probe frames in the network. Network conditions like packet losses, roaming, etc. result in increased active scanning and hence, an excessive increase of the probe traffic. Of the several causes inherent to WLANs like interference, we find an excessive...
In today's era everyone has a smart phone and with increase use of smart phone applications available in market, raise the risk of leaking crucial information about the user and increasing the risk of privacy breach. In this paper, we are analyzing the social relationship leakage of user through such applications which uses phones Global Positioning System (GPS) data. We specifically worked on latitude-longitude...
Human mobility patterns give insights into how people travel in their day-to-day lives. With availability of cellular data, either at large-scale but with low location accuracy or at small-scale but with high location accuracy, studying mobility patterns is now possible. An example of former dataset is CDRs (Call Detail Records) and that of latter is GSM/WiFi/GPS traces collected from mobile phones...
COMSNETS 2014 features a Demos and Exhibits session designed to allow industry and researchers to showcase their latest industrial applications and research prototypes in all communications and networking related topics. This includes innovative technologies, platforms, analysis tools and applications. The demo sessions are spread over two days to ensure maximum visibility and favor a close interaction...
Large proliferation of mobile phone applications result in extensive use of data intensive services such as multimedia download and social network communication. With limited penetration of 3G/4G networks in developing countries, it is common to use low bandwidth 2G services for data communication, resulting in larger download time and correspondingly high power consumption. In this paper, we present...
With the growing number of cities and population, continuous monitoring of city's infrastructure and automated collection of day-to-day events (such as traffic jam) is essential and can help in improving life style of citizens. It is extremely costly and ineffective to install hardware sensors to sense these events in developing regions. Due to advent of smartphones, citizens can play role of sensors...
Location-aware mobile applications are steadily gaining popularity across the world. However, lack of Global Positioning System (GPS) and absence of Wi-Fi infrastructure prevent users with non-Smart phones (majority of population in developing countries) from using location-aware applications as their phones do not have access to their current location. Existing GSM based approaches such as Cell ID-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.