The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Stroke is one of the leading causes of death and disability in India, and the prevalence of this disorder shows a steep rise in the recent decades. Among the many consequences of stroke, the loss of the ability to use language — i.e., aphasia — is a major detriment to the quality of life of the affected individuals. In the recent past, the rise of model-driven treatment approaches has shown promising...
Cloud storage usages are becoming increasingly popular on mobile devices. Through an extensive motivation study, we find that cloud storage accesses from mobile apps suffer from several notable problems that undermine usage experiences. The root cause is that the way of cloud storage providers deploying their services onto mobile devices relies on app developers for the correct and appropriate implementations...
YoMoApp (YouTube Monitoring App) is an Android app to monitor mobile YouTube video streaming on both application- and network-layer. Additionally, it allows to collect subjective Quality of Experience (QoE) feedback of end users. During the development of the app, the stable versions of YoMoApp were already available in the Google Play Store, and the app was downloaded, installed, and used on many...
The recent increase of fine dust levels has resulted in substantially harmful effects on human health. This paper proposes an easily accessible and cost-efficient dust monitoring system that retrieves fine dust levels within a local area. An Arduino-based IoT device is connected to a fine dust sensor and provides dust-level data to a mobile application in real time. The proposed system provides new...
Monitoring based Mobile applications have been developed as the improvement of portable figuring and correspondence innovations. Mobile computing technologies enable the mobile users to make, get to, process, store and impart data without being obliged to a solitary area. The availability of Mobile computing technologies and smart phones gives new possibilities for a continuous monitoring of Aqua...
Given the increasing competition in mobile-app ecosystems, improving the user experience has become a major goal for app vendors. App Store 2.0 will exploit crowdsourced information about apps, devices, and users to increase the overall quality of the delivered mobile apps. App Store 2.0 generates different kinds of actionable feedback from the crowd information. This feedback helps developers deal...
While the number of mobile apps published by app stores keeps on increasing, the quality of these apps varies widely. Unfortunately, for many apps, end-users continue experiencing bugs and crashes once installed on their mobile device. Crashes are annoying for end-users, but they denitely are for app developers who need to reproduce the crashes as fast as possible beforefinding the root cause of the...
Debugging field failures can be a challenging task for app-developers. Insufficient or unreliable information, improper assumptions and multitude of devices (smartphones) being used, are just some of the many factors that may contribute to its challenges. In this work, we design and develop an open-source framework that helps to communicate, localize and patch energy consumption related field failures...
In this paper, the development of a driver deployment and communication system for a food delivery service company is discussed. The client company seeks to improve its infrastructure by implementing new system over its existing system that utilizes traditional communication methods. By using various cloud-based server technologies, we were able to deliver a system that fulfilled all the requirements...
Monitoring the patients is highly important for a successful treatment. In some cases, a patient needs to see the doctor more than once and this may cause extra time and financial load for the patients. These patients, especially accommodating far from hospital, frequently do not cooperate on monitoring. Patient monitoring is important for the course of a disease. Remote disease (treatment) monitoring...
Security-sensitive behaviors in Android applications (apps for short) may or may not be malicious. We propose that a fundamental difference between malicious and benign behaviors is that their corresponding user intentions are different, i.e., whether there is an association between the app behavior and user intention. The user knows and wants this behavior to happen. Based on this discovery, we first...
The increased computation and storage capabilities of smartphones have attracted more and more cybercriminals to write mobile malware for different purposes. Due to the popularity of smartphones in both personal life and business, it is empowering an emerging mobile security threat issue. In this paper, we present an intrusion detection system that incorporates not only network features but also host-based...
This work describes the development of a mobile incident response system which can be used by public entities such as the police or municipality services to improve the assignment of response teams to reported incidents. It is also shown that the system can be easily integrated to augment current indoor air quality monitoring systems in future buildings. The system is based on the capability of smartphones...
The paper presents the design and implementation of an Ethernet-based Smart Home intelligent system for monitoring the electrical energy consumption based upon the real time tracking of the devices at home an INTEL GALILEO 2ND generation development board, which can be used in homes and societies. The proposed system works on real time monitoring and voice control, so that the electrical devices and...
With the spread of smartphones, our daily lives become more convenient. However, using smartphone has also made us to be exposed to various security threats. Especially, the number of mobile malware has been increasing with years and mobile malwares are becoming more intelligent and sophisticated. There are a lot of measures to deal with mobile malwares, but techniques evading them have also been...
Mobile applications (apps) have access to a large volume of sensitive user information. Current mobile platforms such as Android do not provide a means for the user to quantitatively understand the nature of access to their sensitive data by apps. In this paper, we present our approach to profile app's access to user's data with the ultimate goal of developing a personal privacy threshold for users...
In this demo, we present a monitoring platform dedicated to the collection, storage, analysis and visualization of logs and network flow data of mobile applications. The platform relies on a set of on-device probes to monitor network and system activities of these applications. The data are collected from these probes and parsed through generic and flexible collectors relying on Flume agents that...
With the growing Smartphone user groups, security issues on Android platform must be taken seriously. Currently, faced with the severe situation of the Internet Security, and considering inherent risks in Android OS, study on key technologies of Android Malware has become important. In this paper, we have analyzed technologies of Android Trojans on implantation, silent running, concealment, monitoring,...
For a variety of reasons, Bluetooth-enabled mobile medical devices are often not designed with security in mind. As a result, many of them are open to malicious attacks, notably man-in-the-middle (MITM) attacks. For some classes of mobile medical devices, such as pulse oximeters, a MITM attack may have little impact on the safety and privacy of the patient. For more essential devices, such as pacemakers...
In this paper, we address the problem of mobile phishing via the implementation of a Trojan that commits phishing through the mobile's pre-installed applications, which are naturally trusted. It utilizes task interception along with lack of identity indicators, and it overrides the default behavior of some functions to succeed with the attack. We also study the impact of this Trojan on the device's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.