The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the environmental monitoring solution ekoNET, developed for a real-time monitoring of air pollution and other atmospheric condition parameters such as temperature, air pressure and humidity. The system is based on low-cost gas, PM and meteorological sensors providing cost-efficient, simple to deploy, use and maintain solution targeted for the usage within the Internet of Things...
Developed countries are characterized by aging population and economical crisis, so it is desirable to reduce the costs of public and private healthcare systems. It is necessary to streamline the health system resources leading to the development of new medical services based on telemedicine, remote monitoring of chronic patients, personalized health services, new services for dependants, etc. New...
In the Internet of Things, smart things communicate with each other, and sensed data are aggregated and queried for satisfying certain requests of end-users. Wireless sensor networks (WSN) is a key enabling technique for achieving the vision of the Internet of Things. In real applications of WSN, such as environmental monitoring and vehicle tracking, they may require to launch spatial queries for...
Real-time data stream visualization is a challenge in multiple application fields of Smart Cities. Examples of these streams are traffic, pollution, social media activity, citizens dynamic, etc. which show us what, where and when is happening in the city. The purpose of this paper is to apply different types of glyphs for showing real-time stream evolution of data gathered in the city. The use of...
The lack of energy consumption awareness in public spaces is a fact. There, people do not receive energy consumption feedback nor do they pay a monthly invoice to electricity providers. Thus, there is practically a non-existent perception of energy waste, and hence, there is low motivation to reduce it. To tackle this problem we transform everyday shared electrical appliances which are placed in common...
As the app market expands, new challenges arise for developers. Creating useful applications is important in achieving extensive and cohesive use. This paper presents a mobile application called "The Time Machine", offering location-dependent information about the environment in a town. The app is evaluated through expert evaluation, as well as user evaluation conducted as a field observation...
This paper focuses on providing some fundamental analysis for taxi carpooling based on real taxis' GPS traces. Since the increase of resource utilization is one essential benefit for carpooling scheme, we discussed how many get on points and mileages can be reduced. In order to analyze the situation when more taxis are employed, grey prediction algorithm is adopted and validated. The performance of...
A ubiquitous health care system takes the advantage of portability and small size of wireless sensor nodes to provide remote health care services and real-time health monitoring. A gateway is needed to mediate communication between a local sensor network and remote data consumers. In current implementations of ubiquitous health care systems ZigBee-based sensors are often used to gather vital sign...
Each local government dispatches the municipal employee to the disaster site in order to check on the damage at the time of wide-scale disaster. The municipal employee take damage images with a digital camera etc., and bring image data back to the disaster countermeasures headquarters. Then, the municipal employee project damage images on a projector and report damage situations. However, this method...
Earth Observation (EO) is considered a key element in the European Research Roadmap and an opportunity market for the next years. However, this field presents some critical challenges to cover the current demand of services: i) there is massive and large-sized data from Earth Observation recordings, ii) On demand storage, processing and distribution of geo-information generated with the recorded data...
One of major application service areas in M2M (Machine-to-Machine) is the smart grid system. In smart grid systems, information and communications technology are used to gather and act on information that is related to the behaviors of consumers and suppliers. The technology is to improve the efficiency, reliability, and economics of the production and distribution of electricity. To make the system...
This work considers the cooperative communication systems in Decode-and-Forward Mode. The scenario includes one source station, M relay stations and N destinations. In order to meet Quality of Service (QoS) guarantee, the individual capacity between the source station and the destination is considered under the worst case. However, for the whole system, the maximum throughput approaching is the major...
As the high-speed vehicular node passes the coverage area of a road side unit in the vehicular ad hoc network, it may not be able to receive all content information broadcast by the RSU during the short contact duration with the RSU. Hence, when the vehicular node leaves the coverage area of the RSU, it has to adopt the cooperative content distribution approach to share its received content pieces,...
The wireless communication capability of sensors and actuators made them suitable for several automation solutions which involve sensing physical properties and acting upon them. These days, gateway or cloud based sensor/actuator interaction models are widely used. In this model, every sensor/actuator interaction goes through the gateway or via the cloud. In order to realize the true Internet of Things...
A great number of people have Smart Objects in their daily life: Smartphones, cars, tablets, computers, Smart TVs or micro-controllers. Furthermore, these objects have Internet connection. A great number of these objects have various sensors: accelerometers, GPS, pressure, light, temperature, gravity or proximity. The essence of the concept of Internet of Things is to interconnect all these heterogeneous...
This study aims to understand how customers perceive the value of the electronic reservation services and how the perception influences their acceptance intention toward the services. Four potential factors (perceived ease of use, usefulness, negativity, and compatibility) are incorporated to examine their impacts on customers' acceptance of the three electronic reservation services (Internet, telephone,...
The appearance of high performance smartphones and increasing mobile services, enabled by the advancement of mobile phones and mobile communication technology, changed the mobile communication network architecture from a closed type to open type. In the open type network, anyone can access the network and various attacks and abnormal traffic can penetrate it, but existing IP based security technologies...
As the number of scenarios for utilizing sensor data from home appliances, privacy issues such as leakage of private information from sensor data are arising. In this paper, we introduce a new technology, partial decryption, which enables parts of the data to be masked while still encrypted, so other data can be substituted or the encryption key can be changed.
Recently, security concerns to automobiles are rapidly increasing. When threats are found in a vehicular system, this may usually take time to acquire adequate countermeasures. Threats to a vehicle can be classified into three categories: theft of in-vehicle devices, penetration into the internal network and utilization of the external network. This paper surveys threats in each category and their...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.