The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper examines the challenges of using electrocardiogram (ECG) monitoring in wearable computing systems for addressing drowsiness detection while driving. The approaches for extrapolating a person's waking/sleeping state using time-series data is provided and verified against real ECG data available from the PhysioBank data archives. A system incorporating an off-the-shelf wearable ECG monitor...
The Internet of Things (IoT) will connect billions of devices deployed around the world in a near future by embedding mobile network and processing power capabilities into a wide range of physical computing devices used in everyday life of many people. Recent studies concerning IoT have addressed not only the interoperability of devices, but also the context awareness feature which makes easy to discover,...
The success of Wi-Fi technology as an efficient and low-cost last-mile access solution has enabled massive spontaneous deployments generating storms of beacons all across the globe. Emerging location systems are using these beacons to observe mobility patterns of people through portable or wearable devices and offer use-cases that can help solve critical problems in the developing world. In this paper,...
Networked Virtual Environments (NEV) are sets of disjointed virtual worlds which are topographically set apart from the users yet connected through the communication network to give them the illusion of being in the same virtual location. NVEs are increasingly receiving consideration from business and research point of view. Contrasted with various sorts of possible applications, NVEs require a high...
This paper demonstrates a new ID card based momentum measurement system for office workers' health managements in companies. Our system can measure office workers' momentum with a new ID card that implements a microprocessor, sensors and a RFID tag because an amount of momentum has a relation with a health condition and it is an important indicator to prevent chronic diseases. RFID based ID cards...
Recently, due to the development of automobile industry, the number of vehicles is increasing. The traditional parking lots are unable to meet the growing demands from so many vehicles. Therefore, the current parking lots present many problems. Such as, can't find parking spaces quickly, difficult to manage too many vehicles and manual toll collection costs much time. To solve those problems above,...
Network efficiency and proper utilization of its resources are essential requirements to operate wireless networks in an optimal fashion. Cognitive radio aims to fulfill these requirements by exploiting artificial intelligence techniques to create an entity called cognitive engine. Cognitive engine exploits awareness about the surrounding radio environment to optimize the use of radio resources and...
We present a set of protocols for creating a secure processing tree used for completing a task without divulging critical information. We analyze the information that is exchanged during the protocols and the effect of compromising participants.
World wide road traffic fatality and accident rates are high, and this is true even in technologically advanced countries like the USA. Despite the advances in Intelligent Transportation Systems, safe transportation routing i.e., finding safest routes is largely an overlooked paradigm. In recent years, large amount of traffic data has been produced by people, Internet of Vehicles and Internet of Things...
The proliferating usage of cloud environments to store databases poses new challenges. Traditional encryption protects the user's data privacy, but prevents the server from executing computations on behalf of the user (client). By contrast, Partially Homomorphic Encryption schemes, such as the Paillier cryptosystem, facilitate some server queries but involve heavy computations that make them relatively...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.