The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article discusses a new method in detecting the road by using corner adjacent features. Corner is a vertices obtained from every part of vehicle moving from one point to the other, which will be the basic for the road boundary calculation process. The adoption of Lukas Kanade and Melkman algorithm [13] proofs to improve system responsiveness towards the motion of moving object. It is proven that...
The implications of the Trans Pacific Partnership (TPP) Agreement for promoting innovation and growth in the Digital Economy of the Asia-Pacific Region are examined. The Treaty is the first multilateral agreement to specifically take up economic and trade issues related to the Internet and includes ground-breaking provisions with respect to online privacy, cybersecurity, promotion of cross-border...
Telemedicine is one of interaction model between physician and patients in the era of globalization. All of the countries in the world are now in position of aggressive establishment of telemedicine especially huge country such Indonesia. In Indonesia, there's a great disparity of healthcare coverage. According to survey in 2013, almost 94.1% of households is located more than 5 km from the nearest...
Wearable computing with computer input just by sight for health care is proposed. Wearable computing with Input-Output Devices based on Eye-Based Human Computer Interaction: EBHCI which allows location based web services including navigation, location/attitude/health condition monitoring is proposed. Through implementation of the proposed wearable computing system, all the functionality is confirmed...
The Taiwan Information Security Center (TWISC) was initiated as a research program in April 2005 and funded by the Ministry of Science and Technology for the past few years. TWISC pulls together experts in information security from various universities and research institutes in Taiwan with an aim to boost research and development activities in information security, promote public awareness, and foster...
A novel concept, termed as Knowledge Home, is introduced in this paper. The Knowledge Home encompasses a virtual Home with the ability of identifying different human senses and feelings and transmitting them through wireless communication technology. Modern communication technologies are helping humankind to achieve a high level of quality of life. Earlier, Human Bond Communication (HBC) was introduced...
Urban planning, development and management authorities and stakeholders need to understand and analyse the mobility patterns of urban dwellers in order to manage sociological, economic and environmental issues. Simulation is indispensable a tool for authorities and stakeholders to better design, operate and control the mobility infrastructures of smart cities. We propose an approach for the simulation...
The paper describes a problematic about analysis of the Cross Ambiguity Function of a DVB-T signal in the Passive Coherent Location system. The analysis includes effects of the different parameters of the DVB-T signal on the Cross Ambiguity Function. The analyzed parameters are guard interval, effects of the different pilot carriers, etc.
Megrelishvili protocol is a linear algebraic-based key exchange procedure between two parties. Unlike the well-known Diffie-Hellman protocol or its variants, the security of this protocol does not rely on the generic discrete logarithm problem in a particular group. In this article we investigate Megrelishvili Vector-Matrix Problem (MVMP) as a computational problem that underlies the security of Megrelishvili...
Detecting plagiarism between two papers located on different institutions cannot be done as long as there are institutions refusing to open their collection for public fearing them being plagiarized. This research developed a prototype of a cross-institutional federated document search using API-based hybrid peer-to-peer network. This approach enables searching for documents without institutions opening...
The evolution of IPv6 technology had become a worldwide trend and showed a significant increase, particularly with the near-coming era named “Internet of Things” or so-called IOT. Concomitant with the transition process from version 4 to version 6, there are open security hole that considered to be vulnerable, mainly against cyber-attacks that poses a threat to companies implements IPv6 network topology...
Machine-to-Machine (M2M) technology is one of the key enablers of Internet of Things (IoT) vision which allows communication among smart things in the network and the back end system. Ensuring security through proper key management utilization is without a doubt an important requirement of any M2M system. This paper proposed a key management scheme based on the Elliptic Curve Cryptography (ECC) for...
Internet of Things is a novel paradigm that combined microcomputer and wireless communication technology. IoT device will be considered as a pervasive and ubiquitous device that able to interact with it user and environment autonomously with minimum human intervention. At present, wireless technology already has pervasive features in the link and the network layer. They able to do the dynamic addressing,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.