The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Performing activity recognition using the information provided by the different sensors embedded in a smartphone face limitations due to the capabilities of those devices when the computations are carried out in the terminal. In this work a fuzzy inference module is implemented in order to decide which classifier is the most appropriate to be used at a specific moment regarding the application requirements...
The assessment of the general health status of people with cognitive impairment, and so the quality of drug therapy, requires reliable information about their daily lifestyle. Especially in the case of Alzheimer's Disease (AD) patients, the patients themselves or their primary caregivers may not be reliable in providing such information. This raises the demand for a new generation of intelligent,...
When multiple sensor-driven services are deployed in the same environment, execution of a service may trigger other services, successively. Such chain reactions of services often cause undesirable feature interactions. This paper presents a framework that can characterize and detect the service chains within the home network system (HNS). We first introduce the ECA rules to describe the services,...
Failure in the network devices can be identified by detecting changes in the behaviour of the network. Such a network can be part of the communication infrastructure, which will play a significant role in the emergency managements. Network power consumption behaviour, namely its power profile, is a relatively robust profile such that from changes in that profile failure of the links or/and the nodes...
To enable context-awareness for many distributed mobile applications, an architecture is needed that supports the collecting of disseminated context attributes. After the structuring and storing of context, the interpretation and adaptation with reference to the current context and changes of context must be applied. These tasks are common to a large set of context-aware applications and can be centralized...
This demonstration presents configuration folding, a novel technique which enables the energy efficient execution of multiple context recognition applications on a personal mobile device. Configuration folding achieves energy efficiency by identifying and removing the redundant functionalities in different context recognition applications at runtime. The demonstration shows the effectiveness of configuration...
P2PSIP is a protocol for managing multimedia sessions in a distributed architecture, where all participating nodes share and manage network resources like bandwidth and disk space. This paper presents threats associated with P2PSIP protocol and proposes protocol enhancement to mitigate possible attacks. These extensions have been designed for the leading draft of P2PSIP overlay management protocol,...
The triage tag is used in Mass Casualty Incident (MCI) to check the priority of patients treatments and conditions. However, it is difficult to grasp a change in the patient's information since it is a paper tag. In this paper, we propose a system using the electronic triage tag (eTriage) that facilitates emergency medical technicians to grasp patients locations and conditions through visualization...
A flexible and easy-to-use disaster management system is vital to provide rescue teams with accurate information and communication. This work promotes a post disaster management system that provides communication in infrastructure as well as ad hoc scenarios and that supports on demand creation of joint task forces. The system is build upon the Extensible Message and Presence Protocol (XMPP). Scenarios,...
During the last decade scientists have developed earthquake early warning systems EEWS with the intent of alerting citizens of seismic events. The technology is based on the fact that warning signals travels faster than seismic waves. Current EEWS however rely on expensive equipment which are not feasible to deploy in developing countries. This project describes the development of a system based on...
Nowadays we are assisting to a noticeable proliferation of new generation smart-phones, as well as to the growth of mobile applications development. We are fairly surrounded by a huge number of proactive applications, which automatically provide users with relevant information exactly at the right time and at the right place when they need it. This ability is generally given by the exploitation of...
Wireless Sensor Networks (WSNs) are distributed systems composed of battery-powered nodes that sense and collect information about the physical world. They enable applications in a wide variety of domains including but not limited to environmental monitoring, health care and disaster management. In such applications, nodes communicate the sensed information over multiple radio links until it reaches...
Wireless sensor networks gather data, which is then transmitted in a sense-and-send manner to a central sink. The large number of sensor nodes makes configuring them before deployment impossible, resulting in the need for self configuration. The possibly large area that needs to be covered results in the necessity for multihop communication, and is prone to link failures. Therefore, communication...
In rescue operations, information acquisition from rescue personnel in the field is very crucial. Upcoming decision support systems also rely on information gathered in the field, like sensor data or video feeds. A condition for successful information sharing is a reliable communication network. During crisis, infrastructure networks are often unavailable or destroyed. Hence, personnel in the field...
Lifelong learning is a common requirement in today's knowledge society. Traditional teaching approaches fail to deliver learning opportunities if combined with flexibility in time and place, which is another major requirement. Therefore, eLearning systems have evolved in the past decades to Computer-Supported Collaborative Learning and Adaptive Educational Hypermedia Systems. In parallel, the rise...
Activity recognition is a key task for the development of advanced and effective ubiquitous applications in fields like Ambient Assisted Living. Most automated approaches for the task fail to incorporate dependencies between non-close time instants. In this paper we present a simple approach for introducing longer-range interactions based on sequential pattern mining. The algorithm searches for patterns...
In accordance with the recent explosive growth of smart devices such as smartphones and tablet PCs, their portability enables users to receive an unprecedented level of convenience and satisfaction for watching video in hand. However, due to limited screen size and input methods of the mobile devices, users are experiencing inconvenience in order to bookmark video scenes or annotate video clips. In...
The emergence of large scale, distributed, sensor-enabled, machine-to-machine pervasive applications necessitates engaging with providers of information on demand to collect the information, of varying quality levels, to be used to infer about the state of the world and decide actions in response. In these highly fluid operational environments, involving information providers and consumers of various...
The need for communication is highest in disaster scenarios when the infrastructure is also adversely affected. A recent protocol for ad hoc communication, the BATMAN protocol, is dependent on minimal infrastructure, in the form of mesh nodes that are used as access points, or nodes acting as an intermediary in a multi-hop connection. While BATMAN works well in a scenario in which there is a multihop...
The domain of smart meeting rooms is an interesting emerging subset of pervasive learning environments. In a given smart meeting room, several users are supposed to cooperate together while employing a set of static and dynamic heterogeneous devices beside an ensemble of passive objects. Moreover the location specification for every resident entity in the environment, and the synchronization between...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.