The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The detection mechanism provided by current antimalware technologies expects that security researchers build a signature to uniquely identify the malicious samples. Once obtained, the signature will made available to final users using the update mechanism. This time window, which begins when malware is released and it lasts until the malware is identified, it is called zero-day window and represents...
A Wireless Sensor and Actor Network (WSAN) is a group of wireless devices with the ability to sense physical events (sensors) or/and to perform relatively complicated actions (actors), based on the sensed data shared by sensors. This paper presents design and implementation of a simulation system based on Deep Q-Network (DQN) for mobile actor node control in WSANs. DQN is a deep neural network structure...
Mobile payment protocols have become more and more popular with the rapid development of network and mobile phones technologies. It gradually changes the consuming behaviors of consumers. However, must of the existing mobile payment protocols can only support on-line transactions. Some provides off-line transactions but have the limitation of micro-payments only. A micro-payment allows only a very...
In wireless sensor networks, sensors typically aim to transmit their own readings to the sink node. Constructing an efficient data collection tree is very important since it can determine the lifetime of the given WSNs. In literature, may studies have investigated this issue and proposed algorithms for mobile sink to visit each sensor such that the readings of the sensors can be directly transmit...
On large scale disasters, such as the Eastern Japan Great Earthquake and Kumamoto Earthquake, due to mud slides of cliff and floodwater of rivers, many disaster areas are physically isolated and relief and support activities of victims become quite difficult. The communication means are also destructed in those areas and cannot transmit the disaster information. In order to resolve those problems,...
Wireless rechargeable sensor networks are becoming crucial and important in recent years for the advancement of wireless energy transmission technology. The previous research shown that not all of sensors can be recharged due to the limitation of energy capacity that mobile chargers can carry. If a sensor playing a critical role in a sensing task cannot function as usual due to the exhausted energy,...
Traditional libraries provide an Online Public Access Catalog (OPAC) as a portal for searches. Unfortunately, the call numbers patrons receive as a response lack the explicit information to guide the patron to the shelf in question. This can lead to a complicated and often time-consuming search, particularly in large multi-level structures. In this study, we developed a panorama-based navigation service...
The popularization of Long Term Evolution (LTE) leads to the issues of mobile data usage monitoring and prediction. The analyses of these issues can be referred for the deployment of mobile network and the recommendation of customer solutions. However, a great deal of statistical computing power and time is needed for several previous mobile data usage prediction methods. Because large variances may...
Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and enormous research efforts have been dedicated to the development of e-learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is low. One of the reasons is the low study desire and motivation. In this work, we...
Our previous work suggested an interactive learning process, which use the students' study records in order to improve the students' learning motivation and the self-learning time. To improve the progress speed of a lecture and the efficiency of the Self-learning, we proposed an Active Learning System (ALS) using smartphone. In addition, we suggested the group discussion system of ALS. However, the...
IMS (IP Multimedia Subsystem) is confronted to various evolutions. The purpose of these evolutions is focused on enhancing subscriber experience by offering a variety of services that meets his needs and requirements. To respond to this problematic, we must consider subscriber profile information in service discovery process. IMS presents a significant mass of information of subscribers' profiles...
The recent spread of mobile networks has paved the way for building a pervasive social networking (PSN) environment, which enables people to access social networking services (SNS) anytime and from anywhere. There have been extensive studies on MANET (Mobile Ad-hoc NETworks), which use mobile terminals for relaying information. While the feasibility of using them as emergency networks in the aftermath...
User authentication is a very important securitymechanism for accessing the services while roaming in theglobal mobility networks. However, the authentication schemesdesigned are vulnerable to the attacks, hence new requirementsshould be employed while designing a scheme. In 2014 Gopeand Hwang proposed an efficient mutual authentication andkey agreement scheme, in which they stated that the schemeprovides...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.