The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The introduction of IPv6 has opened up several questions with reference to its adaption and transition from IPv4 to IPv6 and is one of the crucial issues being frequently discussed in networking community today. IPv6 provides many seamless features that makes it far better protocol as compared to its predecessor IPv4. It is a well-known fact that IPv4 is a defacto standard at present and is currently...
There emerges an increasing need to overcome the obstacles of connecting heterogeneous home appliances. Based on previously proposed home service bus and driver processing language, we design and implement a service-based proxy framework for smart space environments. Two types of proxies (i.e. Domain proxy and group proxy) are deployed as system components to convert device functionalities to standard...
As a result of the growth of formal and informal pre-college engineering opportunities, many students are enrolling in university engineering programs with significant prior exposure to engineering ideas and practices. This study explores how participation in pre-college engineering programs and activities affects the experiences of students in a first-year engineering program. Twenty-three students...
In this paper a platform is developed to facilitate the control of household loads using communication protocols relevant to home automation and substation automation systems. Protection IEDs that support IEC 61850 standard based protocol, universal secondary test gear for relays and a protocol converter are used to realize the protection/automation aspects for substation automation. The retrofitting...
Communication with smart objects currently only works in isolated, sometimes even proprietary islands. This lack of interoperability limits the value of smart objects connected to the Internet of Things (IoT). We propose to use the Extensible Messaging and Presence Protocol (XMPP) to connect IoT islands. XMPP is inherently federated, secure, globally scalable and designed for collaboration. We use...
Falls result in substantial disability, morbidity, and mortality among older people. Early detection of fall risks and timely intervention can prevent falls and injuries due to falls. Simple field tests, such as repeated chair rise, are used in clinical assessment of fall risks in older people. Development of on-body sensors introduces potential beneficial alternatives for traditional clinical methods...
SpaceFibre is a high-speed data-link technology being developed by the University of Dundee for ESA to support spacecraft onboard data-handling applications. SpaceFibre operates at 2.5 Gbits/s, can run over fibre optic or electrical media, provides galvanic isolation, includes Quality of Service (QoS) and Fault Detection Isolation and Recovery (FDIR) support, and provides low-latency signalling. It...
In underwater wireless sensor network (UWSN), node estimation poses a great challenge using conventional protocol techniques due to underwater propagation characteristics. For this reason, a cross-correlation based technique is applied to estimate the number of nodes, which is equally suitable for any environment networks. The nodes are considered as acoustic signal sources in an underwater network...
In a Secure Multiparty Computation (SMC), mutually distrusting parties use cryptographic techniques to cooperatively compute over their private data, in the process each party learns only explicitly revealed outputs. In this paper, we present Wysteria, a high-level programming language for writing SMCs. As with past languages, like Fairplay, Wysteria compiles secure computations to circuits that are...
As more community colleges have adopted a video conferencing system for tele-education and tele-meetings, this new conference technology enables a convenient collaborative communication between the branch campuses and the mother campus through the so-called BCCA network. However, the insufficient bandwidth of video conferencing may often result in high frequent video disruptions, mosaic pictures,...
In the modern digital age, there is a deluge of data The data and associated information affects nearly every aspect of human life. Ensuring availability and durability of data is critical Availability of data is addressed by various file system technologies that invariably provide a distributed and redundant storage infrastructure. Durability of data is a different dimension and is ensured by providing...
English translation of Chinese pediatrie points is a long neglected field in all kinds of TCM nomenclatures and dictionaries. However, the authors believe it is necessary to include it in the future international standardized TCM nomenclatures or dictionaries in three aspects and the principles and protocol of its English translation are thus proposed.
Nowadays there hardly exist accessible off the shelf toys for children and adults with disabilities. One group of non-trivial toys that are very interesting for people with physical disabilities are remote controlled (RC) models because the remotes can be easily exchanged by custom ones. If the controller is once adapted to the individual needs of a user, he can buy models in RC hobby shops without...
The paradigm of proxy signature is one of important digital signatures. In a proxy signature scheme, it allows an entity to delegate signing capabilities to other participants so that they can sign on behalf of the entity. Proxy signatures are useful to design cryptographic protocols, however, there are only few provable secure proxy signature schemes. In this paper, we propose a new provably secure...
For approaching the implementation of SPA standard, this paper has introduced a design of Space Wire-PnP interface, basis of SPA, utilizing the flexibility of the application layer of Space Wire standard. Both hardware and software design have been demonstrated, and functional verification is provided at last.
Students consistently struggle to locate, evaluate and apply high quality information to solve open-ended problems they come across in their engineering courses. Internet search engines identify millions of web pages that match generic searches, but frequently, the resources they return are superficial and targeted toward selling products, rather than providing useful, relevant information to inform...
Near Field Communication (NFC) standards cover communications protocols and data exchange formats. They are based on existing radio-frequency identification (RFID) standards. In Japan, Felica card is a popular way to identify the unique ID. Recently, the attendance management system (AMS) with RFID technology has been developed as a part of Smart University, which is the educational infrastructure...
There is a high need for secure authentication protocols conforming with the EPC Class-1 Generation 2 (Gen2 in short) standard. The security analyses of the new born authentication protocols provide some guidelines and lessons that should be considered in the design of new proposals. In this paper, we scrutinize the security of a Gen2 based RFID authentication protocol which has been recently proposed...
The advent of ROS, the Robot Operating System, has finally made it possible to implement and use state-of-the-art navigation and manipulation algorithms on widely-available, inexpensive standard robot platforms. With the addition of the Rosbridge application programming interface, interface designers and applications programmers can create robot interfaces and behaviors without venturing into the...
In light of the highly complex nature of the development of technical standards in high-technology industries, this paper discusses four essentials for the design of modular R&D within standardization and analyzes its optimization based on fundamental elements of modular design. This is an attempt to improve R&D capability and R&D performance of high-technology enterprises (HTEs) in standardization,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.