The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order for an election system to be trusted, it needs to be verifiable. Methods must exist to check that the votes are cast as intended by the voters. There must be strong evidence that the machines function as they are supposed to function. Voters should feel confident that the election is conducted fairly and accurately. This paper first outlines the major concerns about election technologies...
With more companies turning towards cloud computing for storage and processing of their data, the security of the cloud becomes essential. However, cloud computing is vulnerable to many security threats, including data leakages, compromised credentials, presence of unauthorized users or entities, execution of insecure applications or programming interfaces and APIs, shared technology vulnerabilities,...
Wireless rechargeable sensor networks are becoming crucial and important in recent years for the advancement of wireless energy transmission technology. The previous research shown that not all of sensors can be recharged due to the limitation of energy capacity that mobile chargers can carry. If a sensor playing a critical role in a sensing task cannot function as usual due to the exhausted energy,...
Wireless sensor networks (WSNs) are extensively used in various industries and environments to monitor an environment and manage risks in situations such as real-time traffic monitoring and health care. The Internet of Thing (IOT) is a wireless sensor networks. Because a WSN is an open wireless communication network, it is vulnerable to security threats and attacks. It must authenticate its partner’s...
Barrier coverage is known as one of the most important applications in wireless sensor networks. Most existing studies adopted the Boolean Sensing Model (BSM) which assumes that sensor can detect the object falling in the sensing range of that sensor. Another sensing model, called Elfes Sensing Model (ESM), which assumes that the probability of sensing is a probabilistic value depending on the distance...
Due to the traditional wireless networks, fixed allocation of spectrum is one of the main reasons causing low utilization of spectrum. To solve the problem, a new wireless communication model has been proposed, which called Cognitive Radio Networks (CRN). CRN adopts Dynamic Spectrum Access (DSA) technology, thus it can flexibly use the spectrum which primary user temporarily unused. In cognitive radio...
Mobile payment protocols have become more and more popular with the rapid development of network and mobile phones technologies. It gradually changes the consuming behaviors of consumers. However, must of the existing mobile payment protocols can only support on-line transactions. Some provides off-line transactions but have the limitation of micro-payments only. A micro-payment allows only a very...
Localization is an important issue and has been applied in many applications. Many localization mechanisms have been developed in the last decade, including GPS-based, Wi-Fi RSSI Signal based as well as BLE Beacon based localizations. The common disadvantages of the existing localization mechanisms is that they belong the class of Active Localization which requires the localization target carrying...
Information distribution regarding immediately correlated contents is a big challenge in local communities, such as a university campus. One of the main reasons is that a campus' local network is uncovered by public search engines, and most of the local Web sites in a community operate like information silos. A secondary reason is that the daily activities in a local community are highly dynamic,...
Traditional libraries provide an Online Public Access Catalog (OPAC) as a portal for searches. Unfortunately, the call numbers patrons receive as a response lack the explicit information to guide the patron to the shelf in question. This can lead to a complicated and often time-consuming search, particularly in large multi-level structures. In this study, we developed a panorama-based navigation service...
Currently, Visible Light Communication (VLC) technology remains a lagging research in the field of UltraWide Band (UWB), due to the inefficiency of data capture and synchronization period. Accordingly, this paper proposes a fundamental designand implementation of data communication of VLC on the MAC layer based on FPGA. This paper includes basic research context, design and implementation of UWB MAC...
With the rise of Internet technology and development of mobile application, more and more data and information are around us. However, it is not always easy to find the needed information that people want. Therefore, a good recommendation system is required for giving useful or interesting information. To provide useful information for user, a good classification of data is needed for recommendation...
Medical and health data are collected and stored in various document types and databases including clinical treatment records, medical examinations, prognosis health information, health billing and claims, health surveys, and community health settings. Such huge amount, wide range, and unstructured dataset characteristics imply a big challenge for researchers and government officers to analyze and...
Nowadays mass passenger flow phenomena at different degrees appear in many big cities with large-scale transit network, and those phenomena tend to be regular and complicated. As the most popular public transport in Taipei, Mass Rapid Transit (MRT) is a quite effective traffic tool to relieve the pressure of passenger congestion, especially in rush hours. In this paper, a MRT passenger flow prediction...
The number of behavior-support services for user activities has been increasing lately. To provide a highly convenient service, it is necessary to recognize detailed activities of users. However, in reality, to provide a service in a real environment, some issues need to be resolved such as developing devices required for recognizing activity, handling the vast workload involved in creating features...
Face liveness verification is an important procedure against fraud for many applications of face recognition. In this paper, a face liveness verification method based on hyper-spectrum analysis is proposed. Based on the hyperspectral face images collected by a hyperspectral camera, the spectral characteristics of real human faces and face photos in various lighting conditions and feature positions...
Melanoma is one of those skin cancers whichcan be fatal. So, the segmentation of lesions from the digitalimages becomes a crucial step in analysis and diagnosis of askin cancer using image processing techniques. This workproposes a technique for automatic segmentation of lesionfrom the digital dermoscopic images using adaptive thresholdmaking the process invariant and robust. The statisticalfeatures...
In recent years, large-scale natural disasters frequently occurred in Japan, and each time there occurred physical corruption or failure of the communication infrastructure, congestion of the communication network due to abrupt communication traffic occurred. As a result, it had a great influence on information collection and transmission using the Internet[1]. Also, the information required at the...
On large scale disasters, such as the Eastern Japan Great Earthquake and Kumamoto Earthquake, due to mud slides of cliff and floodwater of rivers, many disaster areas are physically isolated and relief and support activities of victims become quite difficult. The communication means are also destructed in those areas and cannot transmit the disaster information. In order to resolve those problems,...
The vehicle-to-vehicle (V2V) networks have become one of the significant topics for the future automobile technologies in recent. However, the high frequency wireless interfaces for V2V networks have some subjects such as the transmission range and the obstacles. Therefore, this paper proposed the Adaptive Array Antenna (AAA) control methods with the image recognitions for the DTN based V2V networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.