The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
PMIPv6 is a network-based mobility management protocol which extends MIPv6 protocol and reduces the configuration load on mobile node's side. However, security issues are the main obstacle for the proliferation of PMIPv6. Access authentication is the fundamental security needs for mobile node to gain reliable service at the access network. Unfortunately, few access authentication schemes for PMIPv6...
As an important part of artificial intelligence, expert systems have widely used in the field of mechanical fault diagnosis. But with the development of the large data and cloud computing, some systems' hardware scale have inflated, which makes the energy consumption become a problem to be solved in the expert system. However the traditional database system is hard to satisfy the semantics need of...
Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and during the last few years enormous research efforts have been dedicated to the development of e-learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is low. One of the reasons is the low study desire and motivation...
One of the most popular IoT-based technologies nowadays are Cyber-Physical Systems (CPSs). In its lowest level, CPSs include a set of transducers which must be automatically connected and configured to achieve a seamless union with the environment. This problem, however, is usually addressed supposing devices with large processing capabilities, instead of small sensors and actuators seamless integrated...
Cyber-attack incidents have become more and more frequent and serious. As a countermeasure against cyber-attacks, the technology of (IP address etc.) trace-back to the attackers is essential. Although many methods have been proposed for this purpose, the existing techniques suffer from the following problems. Only the specific attacks can be traced back. The tracing back is too time-consuming and...
Wireless body sensor network (WBSN) technologies are considered one of attracting research areas in computer science. When combined with the healthcare application, it provides high value technology of comprehensive healthcare monitoring solution in extreme situations including high altitude or disaster area enabling the ground controller to monitor remote pilots or earthquake victims in real time...
Laughing is an important emotional movement of human beings, and recent information technology tackled to build a method that augments the user's laughter. In the previous study, feedback method was used: User's laughter is detected by using electro-myogram, and laughing voice is afforded to the user when the user's laughter is detected. They also had experiment, however, efficiency of their method...
In this paper, performance of hydraulic pressure based routing protocol (HydroCast) is examined, and (Improved HydroCast) a technique for reliable HydroCast is proposed. Pressure level of sensor nodes is used to route data packet in greedy multi hop fashion to sinks deployed on the surface of water. The goal of this paper is to define reliable routing technique, that is applicable for both low and...
Aiming at the PrefixSpan algorithm produce huge amount of project databases in mining sequence patterns, this paper proposes an Improved PrefixSpan algorithm for Mining Sequential Patterns(IPMSP) algorithm. By avoid produce duplicated project databases with the same prefix pattern through checking the prefix with regard to prefix of the sequence database and abnegating the non-frequent items and project...
This paper introduces a concept proposal for accessing driving behavior in public transportation through Mobile Crowd Sensing (MCS), as part of a long-term research project on Advanced Public Transportation System (APTS). The proposed concept makes use of mobile device's accelerometer and passengers' qualitative evaluation to identify aggressive driving behavior, which is believed to be a major factor...
In a heterogeneous wireless network, the network selection and handoff timing have great impact on communication quality. In the past, various utility-based network selection and handoff schemes have been presented but without concerning when network selection is performed when moving. This study presented a PNS (Profile-based Network Selection) scheme based on IEEE802.21 MIIS that invokes user preference...
Anomaly detection is an important component of computer security defense. As the security situation becomes increasingly severe, abnormality is detected by the sequential pattern mining has become a hot research topic. For normal behavior to identify in anomaly detection, proposed software behavior pattern recognition technology which based on improved prefixspan algorithms and sequence similarity...
In this paper, we propose depth and reliability aware delay sensitive (DRADS) routing protocol for underwater wireless sensor networks (UWSNs). We take motivation from underwater opportunistic routing (UWOR) protocol which introduces a new E E L|success (Fi) metric, i.e., the expected end-to-end latency from sender node i to sink. We consider two flaws in UWOR. First, in UWOR protocol, sensor node...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.