Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Mobile edge computing is a new cloud computing paradigm, which makes use of small-sized edge clouds to provide real-time services to users. These mobile edge-clouds (MECs) are located in close proximity to users, thus enabling users to seamlessly access applications running on MECs. Due to the co-existence of the core (centralized) cloud, users, and one or multiple layers of MECs, an important problem...
Currently, all kinds of Location-based Services (LBS) are gradually demanding more location information of mobile users. The WiFi-based indoor positioning technologies have been investigated intensely. However, both positioning accuracy and stability are often degraded by RSS detection variance between different devices. To solve the two problems, this paper proposes a compensation strategy for RSS...
Pokemon Go is a mobile device based game that is very popular among teenagers. The game is based on the Geographic Information System (GIS) that utilizes the player's location and interacts with many fancy characters stored in local databases, and occasionally some information stored in remote databases. The game requires a lot of computations for distances, rules, and interactions. In this paper,...
A novel approach for fast iris recognition on mobile devices is presented in this paper. Its key features are: (i) the use of a combination of classifiers exploiting the iris colour and texture information; (ii) its limited computational time, particularly suitable for fast identity checking on mobile devices; (iii) the high parallelism of the code, making this approach also appropriate for identity...
This paper discusses user behaviour and interactions for multimodal authentication system. Multimodal means, multiple authentication methods are provided for user to access a web application. The supported methods are password, digital certificate, and one-time password (OTP). Users are able to select any methods based on user's preference; personalizing authentication. Nevertheless, the availability...
A novel algorithm is proposed in this study for improving the accuracy and robustness of human biometric identification using electrocardiograms (ECG) from mobile devices. The algorithm combines the advantages of both fiducial and non-fiducial ECG features and implements a fully automated, two-stage cascaded classification system using wavelet analysis coupled with probabilistic random forest machine...
Tourist identification with a lower effort can be highly demandable for the tourism department and related organizations of a country. Nowadays, most of the people including tourists use cell phones to keep communication resulting in corresponding data for every transaction (call, SMS, MMS, mobile data) named call detail record. This kind of data is usually collected and stored by telecom operators...
Recent years can be characterized by the rapid increase of mobile device usage in people's lives. Contemporary mobile devices are equipped with many sensors and have high computational and processing capabilities. In a crowdsourcing systems, mobile users participate constructively in specific information handling. Data collected by crowd of mobile devices and stored in a database may help offering...
Real handwriting authentication systems need a robust writer identification over a long time period. The paper analyzes signature sessions of the ATV-Signature Long Term Database (ATV-SLT DB). The database contains 6 sessions generated by 27 users over 15 month. The quality change of the verification results over a period of 15 month is examined. 64static and dynamic biometric features from the ATV-SLT...
In this paper we have proposed an smart health service for victims in emergency scenario to allow the victims to interconnect without the conventional infrastructure. This service is provided using DTN architecture. By this system architecture, identification of injured people will be easy as it will provide information about the seriousness of the condition of the affected person, so that rescue...
With the rapid development of mobile Internet technology, mobile phones and other mobile terminal products have been widely popular. General public who are not the professional journalist produce more and more pictures, video and other media content anywhere and anytime so that the user-generated content plays an more important role in the news reporting, especially in emergencies. As not having a...
Face recognition has been an active research field for a long time, and recently new challenges have arisen in designing cloud-assisted face recognition algorithms. In a cloud assisted face recognition system, mobile devices acquire the data images; then, in order to unbind the cloud face recognition algorithm from the particular features extracted at the mobile device, the images are encoded and...
To enhance the computer science curriculum, a mobile device application (smart phone app), Kizzle, was developed and is currently tested in an introductory course in computer science. The motivation for the app comes from recent literature that indicates that women and students of color are less likely to participate in class, either to ask or answer questions [1][2]. As a result of this “shyness”...
Traditional Wi-Fi indoor localization system based on big data technique suffers from great degradation due to the instability and low space distinguish ability of received signal strength (RSS). Replacing RSS with channel state information (CSI) is proven to be an efficient method. However, not all CSI raw data contribute equally to the localization performance. The computational cost of fingerprint...
This article is based on the design and implementation of an application for mobile devices with Android operating system, which allows the interrelation of people with hearing impairment. The application is able to learn and recognize a letter or number sign language with no movement by applying artificial neural networks. The application indicates whether the captured image is part of the letter...
The paper presents a thorough evaluation of two representative visual place recognition algorithms that can be applied to the problem of indoor localization of a person equipped with a modern smartphone. The evaluation focuses on comparing two different state-of-the-art approaches: single image-based place recognition, represented by the FAB-MAP algorithm, and recognition based on a sequence of images,...
While indoor localization techniques based on Wi-Fi RSS measurements have been extensively studied, their application to eavesdropping Wi-Fi probe requests sent from mobile devices in large indoor environments, such as shopping malls, is scarce or absent in the literature. The idea behind this work is to observe Wi-Fi enabled smartphones, especially when they are not associated to a network. They...
With the explosion of Web 2.0, platforms such as blogs, e-commerce sites, peer-to-peer networks and social media, consumers have a broad platform and unlimited power to share their experiences in the form of reviews. With this, bulks of reviews are available for a single product, that needs to be analyzed, processed and mine. Opinion Mining or Sentiment Analysis is a Natural Language Processing and...
The prevalence and monetary value of mobile devices, coupled with their compact and, indeed, mobile nature, lead to frequent theft due to a lack of proper anti-theft mechanisms. Currently there only exist damage control efforts such as remote wiping the device's memory or GPS tracking, but nothing to notify users of theft while it takes place. We propose such a mechanism which utilizes the unique...
The great rise of smartphones has allowed the emergence of many new concepts such as the supply by the crowd. The constant movement of the crowd accompanied all the time by their mobile devices leads to the creation of needs and applications that require the joint contribution of the human effort and the use of new technologies. These information systems primarily help achieve tasks involving the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.