The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past decades. Most radio-based solutions require a process of site survey, in which radio signatures of an interested area are annotated with their real recorded locations. Site survey involves intensive costs on manpower and time, limiting the applicable buildings of wireless...
Fast growing data traffic over mobile networks pose many challenges for both end systems and networks to satisfy the required service levels of different applications. For end-users, the quality of experience (QoE), and consequently the underlying quality of service (QoS) are the most meaningful criteria for triggering handovers and selecting target base stations. However, difficulties in reliably...
In India, Information and Communication technologies (ICT) are being increasingly deployed in almost each sector of economy including media, health, agriculture, transportation, and education. Upon an analysis of the existing Indian Election Voting System, it is felt that the ICT remains to be exploited to its fullest potential. Although, the Election Commission of India (ECI) has recently taken up...
This paper describes the design and development of a location-based mobile shopping application for bakery product shops. Whole application is deployed on cloud. The three-tier architecture consists of, front-end, middle-ware and back-end. The front-end level is a location-based mobile shopping application for android mobile devices, for purchasing bakery products of nearby places. Front-end level...
He Near Field Communication (NFC) technology is very comfortable for the user as communication starts without any further configuration. This property makes the standard well suitable for the use with mobile coupons (mCoupons). The application of mCcoupons is quite a novel issue but is becoming increasingly popular among E-commerce because the extensive use of mCoupons can help consumers to save money...
Long-term ECG data for a patient can be acquired by integrating a Holter monitor with a mobile device. We use similar patient search to create an abstraction of a patient's typical heartbeat pattern, in the form of a regular expression, by learning heartbeat patterns. We have simulated these processes on data from the MIT-BIH arrhythmia database, and shown how we can search the database for patients...
This paper develops an Android face recognition application for users on mobile device, and applies it in the face verification system of Samsung Galaxy SII smart phone. The developed face recognition application includes three parts, the face detection using the Viola-Jones face detection program, the feature extraction implemented by the eigenface features, and the face recognition based on the...
With the increase in smartphone sales and the use of clouds, data synchronization is an essential activity in the mobile applications that aim to keep data up-to-date with information from the application server. This paper proposes an analysis of the main approaches for data synchronization concerning energy, which are the polling and pushing techniques. The results show a substantial gain in terms...
In the fourth year of our medical programme, students are required to complete a nine-week rotation in Pediatrics. During the remainder of the academic year students rotate through Obstetrics & Gynecology, Public Health & Primary Care and Psychiatry. The Pediatric course includes a number of assessments: in-course assessments consisting of written reports, presentations, and demonstration...
Unconstrained and contact-free hand recognition problem with mobile devices is not solved yet because these systems have to deal with hard problems like different backgrounds and illumination. Algorithms to perform an image segmentation in order to create regions in the image with the same semantic meaning are a work in progress. Graph theory has been used successfully in order to reach a good image...
Computation offloading is a paramount technology to leverage network resources for mobile devices. This paper studies effect of computation offloading on efficiency of mobile face recognition. It compares offloading alternatives used in existing mobile face-recognition system and reports on their efficiency in terms of energy consumption, processing time and recognition accuracy. The offloading method...
Up till now there does not exist an easy, mobile mechanism that allows to easily capture, recognize and count defined, multiple objects that are visible in surroundings of the user. For this purpose, feature detectors (such as SIFT, SURF or BRISK) are utilized to create a database of products box images and extracted keypoints are stored. Existing algorithms based on keypoints analysis do not allow...
We are glad to present you the moibile museum information system "Open Karelia" developed within the framework of "Euregio Karelia: Museum Hypertext" project. The system is up and running already in museums of Euregion Karelia. It is free and open for new museums from Russia, Europe and CIS countries to join (read more about the proces on page 8). We are grateful for comments and...
When disasters occurs, cellular network might be down and cannot serve subscribers anymore. On the other hand, many victims trapped in a wreckage might still have access to their mobile phone. An OpenBTS-based cellular network has been long before known as an ideal solution to rapidly deploy emergency GSM cellular network in situation after disaster. We propose to deploy a mobile OpenBTS along with...
It has become easier to create a lifelog by using smart phones. Lifelogs can be used in several ways. However, some problems exist in memory recollection; as many lifelogs owned by a person are partial information, it is impractical to remember days themselves. Therefore, a lifelog sharing system for memory recollection is proposed. The system elicits related information from other people's lifelogs...
Handwritten Signature Verification (HSV) systems have been introduced to automatically verify the authenticity of a user signature. In offline systems, the handwritten signature (represented as an image) is taken from a scanned document, while in online systems, pen tablets are used to register signature dynamics (e.g., its position, pressure and velocity). In online HSV systems, signatures (including...
The paper presents a prototype mixed-mode wireless indoor positioning and navigation system. The main goal of the system is to provide accurate and reliable location information for visually impaired users. The system also enables access to location related context information. The radio nodes of the network can operate in two power modes providing basis for both rough and precise user positioning...
Task offloading is a tradeoff between reducing the computational load of mobile devices and increasing data transfers in the network. This paper studies impact of task off-loading on efficiency of mobile face recognition system. It compares two offloading alternatives used in existing mobile face-recognition system and reports on their efficiency in terms of energy consumption, processing time and...
With explosive growth in the number of mobile devices mobile malware is rapidly spreading, making security one of the key issues. Existing solutions, which are mainly based on binary signatures, are not very effective. The main contribution of this paper is a novel methodology to design and implement secure mobile devices by offering a resource-optimized method that combines efficient, light-weight...
With the development of the current 3G mobile communication technology, the 3G mobile terminal learning will gradually become a way of young people learning recognition of popular, this way can make up the limitations existing in current remote education, and change and to promote the form of network education and development. Nowadays, along with the arrival of the era of 3G mobile, 3G mobile communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.