The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart grids use intelligent transmission and distribution network to delivery electricity. This approach aims to improve the electric system's reliability, security, and efficiency through two-way communication of consumption data and dynamic optimization of electric-system operations, maintenance, and planning. The smart grid, in fact, incorporates many resources, applications and enabling technologies...
In case of large scale disaster has been broken out, a large number of disaster damage information are reported from over wide area to disaster countermeasure headquarters. Modern disaster management GISs have limitation of number of statuses at the same time, it suggests restriction of efficiency in case of catastrophic disaster. On the other hand, sharing of damage situation is performed asynchronously...
In this paper, we propose a high presence informal communication system between different locations using tiled display system environment installed on public places. A large number of users can simultaneously use the tiled displays on each location and freely communicate with the other persons using his/her smart phones by exchanging his/her voice, video and messages, eventually informal talk can...
In order to realize high-realistic sensation telecommunication over Wide-Area Network, we consider that non-verbal communication play an important role, and displaying the existence of participant by ultra-quality video in real-time on large-scale screen system between each remote site is effective. However, displaying a video with realistic high-resolution in real-time is difficult, because there...
In an office or laboratory, the informal communication that suddenly occurs in a face-to-face meeting sometimes takes the form of a heated discussion or important information sharing. Visual information, such as pictures and graphs, facilitates the fast and accurate communication of an intention between people. Therefore, visual information should be shown quickly in this situation so that the conversation...
This paper proposes New Disaster Support System at the time of large-scale natural disaster. This Disaster Support System consists of Relief Supplies Distribution Management System and IC Card Authorization Safety Confirmation System. Relief Supplies Distribution Management System is a system which can calculate automatically the amount of relief supplies required for evacuation centers from a refugees...
Though most digital signage systems attracted users' attention when they were installed, they have not been used effectively as time passed. In this study, push type digital signage system that identifies the user who walks in front of it and displays personalized information to the user was developed. In this system, the method of detecting the MAC address of the user's Wi-Fi device was used to identify...
We have been developing a new type of visualization software called "Fusion Visualization". It allows users to fuse latest volume to legacy surface rendering. This ombination makes users enable to select the best rendering technique according to the data size and the network speed if the data transfer is needed. This development was tarted on October 2012 as a project sponsored Japan Science...
In this paper, we propose a P2P Web Proxy system where each peer does not need to consume resources such as data storage or network bandwidth when caching content. In this system, Web servers manage a list of the peers that are downloading content and a candidate list is provided for P2P Web Proxy nodes. If a peer finishes downloading the content, the peer is removed from the list and they leave the...
ICT systems have been investigated for achieving flexible systems configuration, systems operation cost reduction, environmental impact reduction, etc. Cloud computing has attracted attention as technology that solves these. In the U.S., business cloud services, such as Amazon EC2/S3, Google Apps, Force.com, and Windows Azure, are gaining more and more users. Additionally, study on cloud computing,...
It is widely recognized that clouds have advantages in initial installation cost and availability. However, with the popularity of public cloud services, the concern of confidentiality is recognized as the largest problem. We propose a secret distribution data management approach for multiple clouds to maintain confidentiality that involves a secret sharing scheme. With our proposed approach, secret...
With the approval and publication of the IEEE 1905.1 standard in 2013, which was designed to enhance the in-home network technology interoperability, the future in-home networking tends to provide the integration between multiple home network technologies including IEEE 1901 - Broadband over Power Line Networks with the objective of achieving a ubiquitous coverage within the home. So far, we have...
In distributed systems, a group of multiple processes are cooperating with each other by exchanging messages in networks. A process is considered to be a sequence of events in a finite state machine model. Here, it is significant to decide on which event causally precedes another event for a pair of events in a system. In the famous happened-before relation among events, events are ordered on the...
Extended three-particle GHZ state decoy is introduced in controlled quantum secure direct communication to improve eavesdropping detection probability and prevent correlation-elicitation (CE) attack. Each particle of extended three-particle GHZ state decoy is inserted into sending particles to detect eavesdroppers, which reaches 63% eavesdropping detection probability. And decoy particles prevent...
With the rapid development of sensor technologies, in nowadays various types of sensors are deployed around us as a basis to build a smart environment. It is without doubt that how to deal with the huge amount of data collected by various sensors in an efficient way and to transform these data to useful information for people to make use of has become an important research topic. The vast amount of...
In Japan, an effective disaster control is needed because Japan is prone to severe disasters including earthquakes, tsunami, typhoon, heavy rain and snow. Application of the ubiquitous sensing system is expected to be an effective disaster prevention system in disaster-prone Japan. In this paper, we examine the possibility to apply COMOSE (Co-Operative Mobile Sensor Environment) platform that collects...
Many people get lost easily in public places if they are not familiar with the environment. It would be very helpful to have an indoor localization system. Many researches in indoor localization can be found in the literature. However, they usually need to deploy sensors in the environment. It is costly and inconvenient. In this research, we propose to develop a smartphone indoor positioning application...
Recent years, the demands of wireless networks in Taiwan grow fast because of users almost take a cam call or watch video streams on you tube. How to fulfill most users' demand under limited wireless internet resources situation becomes an important issue. In wireless networks resource management, the design of schedulers is the most important part. This paper proposed a scheduling scheme that meets...
File encryption is an effective way for an enterprise to prevent its data from being lost. However, the data may still be deliberately or inadvertently leaked out by the insiders or customers. When the sensitive data are leaked, it often results in huge monetary damages and credit loss. In this paper, we propose a novel group file encryption/decryption method, named the Group File Encryption Method...
In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay that decides the Peer Reliability (PR). In our system, we considered three input parameters: Number of Interactions (NI), Local Score (LS), Security (S). We evaluate the proposed system by computer simulations. The simulation results have shown that the proposed system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.