The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years the use of wireless ad hoc networks has seen an increase of applications. A big part of the research has focused on Mobile Ad Hoc Networks (MAnETs), due to its implementations in vehicular networks, battlefield communications, among others. These peer-to-peer networks usually test novel communications protocols, but leave out the network security part. A wide range of attacks can happen...
Early detection and monitoring of heart diseases increase human quality of life and this can prevent negative consequences. It is even more important because it can prevent sudden deaths. In today's technology, these operations can be done with telemedicine systems. In this work, appropriate methods have been proposed for telemedicine systems. The proposed system is of two classes and is based on...
Human activity recognition (HAR) has a wide range of applications, such as monitoring ambulatory patients' recovery, workers for harmful movement patterns, or elderly populations for falls. These systems often operate in an environment where battery lifespan, power consumption, and hence computational complexity, are of prime concern. This work explores three methods for reducing the dimensionality...
Nowadays Ransomwares are not limited to personal computers. Increasing the number of people accessing cell phones, availability of mobile phone application markets along with lack of an effective way for identifying Ransomwares have accelerated their growth and expansion in the field of mobile phones and IOT. In the following article, an optimal approach is presented that transforms the sequence of...
In this paper we develop a fault detection and isolation method based on data-driven approach. Data-driven methods are effective for feature extraction and feature analysis using statistical techniques. In the proposal, the Cumulated Sum (CUSUM) efficiency is explored for incipient fault detection. The fault is assumed to be a Gain variation, an Offset evolution, a Phase shifting or one of the multiple...
Mechanical characteristics, including the displacement curves of the movable contacts and coil current curves are the most common routine monitoring objects of high voltage circuit breakers to evaluate the machines' condition. Generally, a high-performance mechanical characteristic tester has the ability to offer dozens of parameters consisting of stroke, speed, magnitude of current and so on. Besides,...
This paper presents a new approach for monitoring the elbow flexion with a smart textile based on the piezo-resistive effect. The sensor is composed of a mix of conductive threads made of stainless steel fibers doped with metal particles and dielectric silk threads. The threads are arranged in a double bridle crochet structure to provide the best compromise between mechanical elasticity and sensor...
Fault prediction technology is important to avoid serious process failure. This paper is concerned with the fault prediction of dynamic industrial process with incipient faults and proposes a canonical variable trend analysis (CVTA) based fault prediction method. In the proposed method, canonical variate analysis (CVA) algorithm is firstly applied to analyze the process dynamics and extract the uncorrelated...
Cyber threats push the researchers towards developing detection frameworks for protecting Internet users. Remote administration tool (RAT) is one of the serious cyber tools used by the attackers to fully control the targeted victim machine. In this paper a host based detection framework is introduced for RAT detection. The proposed framework depends on fully analysis of the system behavior of the...
Insulator is an important component in the power grid. Therefore, faulty insulator can cause a great damage to the power grid that would lead to leakage currents flowing through line supports. This leads to increase in electrical loses, voltage drop and put human safety to risk. Hence, it is very important to monitor the condition of an insulator before resulting to a great damage in the power grid...
Realizing the automated and online detection of crowd anomalies from surveillance CCTVs is a research-intensive and application-demanding task. This research proposes a novel technique for detecting crowd abnormalities through analyzing the spatial and temporal features of the input video signals. This integrated solution defines an image descriptor that reflects the global motion information over...
The evaluation and prediction of volcanoes activities and associated risks is still a timely and open issue. The amount of volcano-seismic data acquired by recent monitoring stations is huge (e.g., several years of continuous recordings), thereby making machine learning absolutely necessary for their automatic analysis. The transient nature of the volcano-seismic signatures of interest further enforces...
Temporal sequences of images called Satellite Image Time Series (SITS) allow land cover monitoring and classification by affording a large amount of images. Many approaches attempt to exploit this multi-temporal data in order to extract relevant information such as classification-based techniques. In this paper we compare low and high levels classification-based approaches that aim to reveal the SITS...
The basic necessity of sleep in our life is critically important to ensure our wellbeing. Sufficient sleep of good quality is highly desired in order to have enough energy to live. One of the main factors to measure sleep quality is the amount of body motion during sleep. In our earlier work, we have developed a load cell based system that can detect in-bed body movements and classify them into two...
Users of electronic devices, e.g., laptop, smartphone, etc. have characteristic behaviors while surfing the Web. Profiling this behavior can help identify the person using a given device. In this paper, we introduce a technique to profile users based on their web transactions. We compute several features extracted from a sequence of web transactions and use them with one-class classification techniques...
This paper proposes a monitoring system to prevent falls from a bed. The position of patient on the bed is categorized as stable and unstable. The system has defined the unstable condition as the situation where a patient is lying on the edge of the bed. The patient was then observed using a thermal imagery camera. We extracted x-, and y-axis histograms that can be used as a feature, using this camera...
The research literature on cybersecurity incident response is very rich in automatic intrusion detection methodologies. The most accepted approach to compare the detection performance of the methods is by using a real traffic data set where normal traffic and anomalies are conveniently combined and labeled. In this paper, we follow this approach in a real network where a number of controlled attacks...
The aim of active and assisted living (AAL) is to develop tools to assist the elderly people in the ageing status. Human posture recognition algorithms can help monitor aged people in home environments. Different types of sensors can be used for such a task. A case in point is the RGBD sensors, which are cost-effective and provide rich information about the environment. This work aims to propose a...
Every year over 75 000 firefighters are injured and 159 die in the line of duty. Some of these accidents could be averted if first response team leaders had better information about the situation on the ground. The SAFESENS project is developing a novel monitoring system for first responders designed to provide response team leaders with timely and reliable information about their firefighters' status...
In order to improve healthcare services and support clinical professionals, it is important to develop the unobstructive and automatic ADLs monitoring system for healthcare applications. Currently, various works have been developed for the monitoring of daily activities, such as ambulation, kitchen task, food and fluid intake, dressing, and medication intake while only few works paid attention to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.