The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The key feature of HTML5, the next-generation web standard announced in W3 in October 2015, might be the enhancement of JavaScript functions. While the previous generation HTML required non-standard plug-ins such as Silverlight or Active X for media play and web socket communication, HTML5 provides the functions via new APIs including JavaScript audio and video, which are powerful features that can...
Vehicular ad hoc network (VANET) has been ahot topic in recent years. Currently, VANET research mainlyfocuses on enhancing road safety, traffic safety warning, andreducing traffic accidents. In the future, the security of vehiclecommunication ought to be considered to protect privacy ofusers, such as personal ID and vehicular route. In order toenhance public service vehicles management, ensure officialactivities,...
In research for detecting vulnerability in binary executables, Fuzzing technology is commonly adopted and is effective for detecting vulnerabilities in binary executable. Because the test cases generation for Fuzzing technology is random, the efficiency of detecting vulnerability is very low. In this paper, we propose a predict analysis model for binary program vulnerability analysis, which is based...
In this research, we propose a Virtual Traditional Japanese Crafting Presentation System Mobile Edition. This system consists of the smartphone application and the management web application. The smartphone application provides a virtual object of traditional craft to real space. The user can experience various kinds of traditional craft through this application. And, the management web application...
The development of wireless communication technology and diverse sensors has facilitated user-centered information collection. This has also led to active research on the context-aware-based inference to provide user-tailored services. This paper proposes an approach of predicting disease outbreaks based on the fuzzy rule. There are five physiological input variables: age, blood pressure, cholesterol,...
In this paper, we propose a region based cooperative routing protocol (RPCRP). This protocol performs analysis of amplify and forward technique over Rayleigh fading channels. The source node sends the sensed signal to the destination and available relay nodes. At the destination node, bit error rate (BER) is checked on the basis of which, either positive or negative acknowledgement (ACK or NACK) is...
In this paper will be presented some security features of biometric and linguistic threshold schemes, as well as efficiency evaluation features for such protocols. Possible application of presented algorithms will be described with future directions in the area of strategic information management. Secret splitting algorithms play an important role in securing strategic data or information. Thus innovative...
The road conditions during the winter especially in mountain areas are one of the significant safety subjects for the residences and the tourists. However, there are still many places where the wireless networks such as 3G and LTE are hard to connect in the mountain areas, and it is also difficult to keep continuous data transmissions during the nodes are moving. Therefore, this paper proposes the...
In recent years, Linked Open Data (LOD) has been attracting attention in the world since the LOD have features such as semantic web and ontology. Also, applications using the LOD have been increasing year after year in Japan and in all over the world. However, there are a problem that most of existing LOD are not linked with other LOD. Therefore, original features of the LOD have been lost. In this...
Recently the act of fraud aimed at the air tickets is more and more rampant. Lawbreakers get passenger information from illegal channels, not only make a lot of passengers suffering financial loss, but also influence the reputation and business of airline. There are many ways that passenger information easy to be leaked, in this paper, we just focus on the detection of abnormal access behaviors that...
Social networks are useful tools for disseminating emergency warnings of danger to the population since it promises enormous success because most of the citizens have mobile phones with Internet and social networking applications. We can take advantage of designing a river level sensor to monitor in real time the water level of the river, in addition to storing historical data to forecast leveling...
Home Energy Management System (HEMS) enhances the load scheduling in the next-generation electric grid. Residential users send responses to utilities for scheduling their appliances to the off peak hours when prices are low. The scheduling of the household appliances still not succeeded too much by having some drawbacks. In this research, we have proposed a new algorithm namely GASC for scheduling...
Demand Side Management (DSM) technique encourages the consumers to adjust their energy usage pattern to get optimized results for achieving the goal of minimizing the electricity consumption cost. This mechanism provides benefits to both side customer and utility in terms of cost reduction and grid stability. To regulate the increasing energy demand extensive research is being carried out for possible...
The development of technology, people have a huge demand for smart homes. In recent years, a variety of smart home designs cannot be satisfied with satisfy people. The new technology used in construction, which was called smart homes. Smart home offers many architectural features which are more suitable for human life situations, such as the smart of life, family care, home security, and green building...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.