The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: intelligent pervasive computing; intelligent healthcare systems; intelligent and ubiquitous computing in education; intelligent pervasive middleware; embedded system architecture; and RFID application.
Over the insecure network environment, key agreement is essential for protecting the messages exchanged between two communication parties. And to achieve high security requirements, key agreement schemes providing mutual authentication are commonly used in modern information security systems. In 2005, Lee and Lee proposed a novel authentication with key agreement scheme. But we find that Lee-Lee's...
Because of the limited capability of mobile devices and lower bandwidth of wireless network, web-based e-commerce in mobile wireless environments suffers more challenges and it needs an efficient and reliable mechanism to support the process. This paper presents a flexible and configurable mechanism, which uses mobile agents as brokers of mobile device to communicate with Web server, thus to reduce...
In intelligent e-Learning, personalized search support becomes even more and more important now. This paper shows how to achieve the personalized search in e-learning environments. We present a semantic-based search method for personalized e- Learning. In the method, learning resources ontology and learner ontology are designed for semantic analysis and algorithm for ontology learning. The method...
This paper will present some possibilities of appli- cation of mathematical linguistic formalisms, in the form of structural pattern recognition, in development a new class of intelligent medical diagnosis-support and image recognition systems. Such methods are aimed to facilitate a semantic analysis of the meaning for some selected medical patterns, especially in the form of 2D spinal cord and leg...
In this paper we propose an Intra mode decision method for the MPEG-2 to H.264/AVC transcoders to reduce the huge computational complexity. The DCT coefficients from the MPEG-2 decoder are used for the intra mode decision of H.264/AVC encoder. Based on the spatial activity analysis with the coefficients, early mode decision method between Intra16x16 and Intra4x4 modes and the Intra prediction direction...
Security is a significant concern for many sensor network applications. Intrusion detection is one method of defending against attacks. However, standard intrusion detection is not suitable for sensor networks with limited battery power, memory and processing resources. This paper compares several approaches to intrusion detection in sensor networks. We investigate accuracy of detection of attacks...
Pervasive computing and the increasing networking needs usually demand from publishing data without revealing sensible information. Among several data protection methods proposed in the literature, those based on linear regression are widely used for numerical data. However, no attempts have been made to study the effect of using more complex polynomial regression methods. In this paper, we present...
It has been a challenging problem to support target coverage with QoS requirements in wireless sensor networks, because we need to consider both energy constraint and so-called target Q-coverage requirement, i.e. different targets may require different sensing quality in terms of the number of transducers, data sampling rate, etc. First we prove that this problem is NP- complete, then we formulate...
Location systems are core technologies for enabling pervasive computing smart spaces. Signal strength based location estimation offers economical viability and sufficient accuracy for numerous location based services. Despite extensive research being carried out in this positioning method, tedious and lengthy development life cycle prohibits wide scale deployment of these systems. We present a new...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.