The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The recent increase of fine dust levels has resulted in substantially harmful effects on human health. This paper proposes an easily accessible and cost-efficient dust monitoring system that retrieves fine dust levels within a local area. An Arduino-based IoT device is connected to a fine dust sensor and provides dust-level data to a mobile application in real time. The proposed system provides new...
Given the increasing competition in mobile-app ecosystems, improving the user experience has become a major goal for app vendors. App Store 2.0 will exploit crowdsourced information about apps, devices, and users to increase the overall quality of the delivered mobile apps. App Store 2.0 generates different kinds of actionable feedback from the crowd information. This feedback helps developers deal...
A mobile medical monitoring system based on s-martphone is proposed in this paper. The system can collect patient's physiological data by portable device and send them to patients' smartphone. Their smartphones will enlarge the data by uploading them to remote database, so that doctor and patient's family can access to the data far away and monitor patient's health condition. Furthermore, APP in smartphone...
Water supply has become a big problem over the past few years, due to overpopulation, climate change, and deterioration of pipes which can cause major problems, such as water leakage. The real problem is not (in most cases) the size of the leak, but the time it takes to detect it. In this paper, an implementation of a system to monitor the water tanks is presented. The system is called InteRface for...
In this paper, the development of a driver deployment and communication system for a food delivery service company is discussed. The client company seeks to improve its infrastructure by implementing new system over its existing system that utilizes traditional communication methods. By using various cloud-based server technologies, we were able to deliver a system that fulfilled all the requirements...
Monitoring the patients is highly important for a successful treatment. In some cases, a patient needs to see the doctor more than once and this may cause extra time and financial load for the patients. These patients, especially accommodating far from hospital, frequently do not cooperate on monitoring. Patient monitoring is important for the course of a disease. Remote disease (treatment) monitoring...
Effective detection of malware is of paramount importance for securing the next generation of smart devices. Static detection, the preferred technique used so far, is not sufficiently powerful to defeat state-of-the-art malware, and will be even less effective in the near future. Dynamic malware detection guarantees better protection since it operates at run-time and can identify also unknown malware,...
Nowadays, there is a great opportunity for mobile Health using different devices and platforms. A significant number of Health applications have been already developed for those platforms. According to WHO's latest update (2004) of the Global Burden of Disease, between the most prevalent conditions are iron-deficiency anemia, hearing loss, migraine, low vision, asthma, diabetes mellitus, and others...
The increased computation and storage capabilities of smartphones have attracted more and more cybercriminals to write mobile malware for different purposes. Due to the popularity of smartphones in both personal life and business, it is empowering an emerging mobile security threat issue. In this paper, we present an intrusion detection system that incorporates not only network features but also host-based...
The paper presents the design and implementation of an Ethernet-based Smart Home intelligent system for monitoring the electrical energy consumption based upon the real time tracking of the devices at home an INTEL GALILEO 2ND generation development board, which can be used in homes and societies. The proposed system works on real time monitoring and voice control, so that the electrical devices and...
In undersea environment, development of low-cost communication module is highly important for dissemination of undersea wireless sensor networks. Some undersea wireless sensor network applications do not require high performance communication capability such as transmission distance. If the terrestrial low-cost communication module can be used in the undersea environment, it is possible to use the...
This paperwork describes the development and test of circuitry and software to enable the use of Android mobile phones equipped with Bluetooth to receive the incoming electrocardiogram (ECG) signal from a user and show it in real-time on the cell phone screen. The system comprises three distinct subsystems. The first one is dedicated to condition the analog ECG signal, preparing it for conversion...
Mobile applications (apps) have access to a large volume of sensitive user information. Current mobile platforms such as Android do not provide a means for the user to quantitatively understand the nature of access to their sensitive data by apps. In this paper, we present our approach to profile app's access to user's data with the ultimate goal of developing a personal privacy threshold for users...
With the growing Smartphone user groups, security issues on Android platform must be taken seriously. Currently, faced with the severe situation of the Internet Security, and considering inherent risks in Android OS, study on key technologies of Android Malware has become important. In this paper, we have analyzed technologies of Android Trojans on implantation, silent running, concealment, monitoring,...
The main objective of this paper is to provide a excelling provision to hospitalization for patients and mainly for physician who are enable to supervise their patients at the right time in the hospital itself. The benefits of these efforts is presented, which followed by successful studies in acquiring different signals like temperature, ECG from healthy persons by using BIO-PAC system which is for...
In this paper, we address the problem of mobile phishing via the implementation of a Trojan that commits phishing through the mobile's pre-installed applications, which are naturally trusted. It utilizes task interception along with lack of identity indicators, and it overrides the default behavior of some functions to succeed with the attack. We also study the impact of this Trojan on the device's...
“Invisible eavesdropping” in this paper means that some applications call the mobile phone's microphone module and gather the user's voice and transmit information illegally when the screen is locked or the users are playing games and completely unaware of the situation. Based on idea of “real-time monitoring” and “active protection”, a scheme was proposed in this paper using the access authority...
Healthy eating and regular physical activity plays a substantial role in preventing diseases like heart disease, high blood pressure, cancer, diabetes and stroke etc. As mobile devices have become an integral part of our lives, it can alter the way we look after our health. Seeing the increase in adoption of mobile in our daily lives, we have used mobile as a platform for a healthcare, so that people...
Despite much advancement in mobile computing technologies, the smart devices still suffer from battery limitations. The power consumption largely depends on how the end-users interact with their smart devices. Continuous usage of exotic hardware, inbuilt sensors, network and bright colorful display shorten battery life significantly. Thus the key to develop power saving solutions is to understand...
With social, mobile, analytics and cloud technologies (SMAC stack) the driving assistance system can be improved by monitoring both vehicle parameters and driving pattern. Vehicle condition due to parts condition also influences the danger-level during driving. The proposed system recognizes the danger-level alerts during driving by considering both driving pattern and vehicle condition. The system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.