The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As a step towards mobile and ubiquitous computing, the TRAMP Real-time Application Mobility Platform (TRAMP) enables secure and user-friendly migration of multimedia application components. The motivating factors are device and user mobiliy, i.e., to let the user determine where application components should execute at all times. In order to organize and locate roaming devices, a decentralized peer-to-peer...
in idea is to express a ballot to allow voting for up to out the candidates and unlimited participants. The purpose of vote is to select more than one winner among candidates. Our result is complementary to the result by Sun peiyong ¡äs scheme, in the sense, their scheme is not amenable for large-scale electronic voting due to flaw of ballot structure. In our scheme the vote is split and hidden, and...
The popularity and influence of social media have been continuously expanding worldwide, and a similar trend is visible in educational settings. Social media tools have been reportedly used for a variety of educational purposes and in wide-ranging contexts, bridging formal and informal, as well as individual and collaborative learning. Currently, the trend is toward the integration of social media...
Multimedia documents can be accessed at anytime and anywhere on a wide variety of devices, such as laptops, tablets and smartphones. The heterogeneity of devices and user preferences has raised a serious issue for multimedia contents adaptation. Our research focuses on multimedia documents adaptation with a strong focus on interaction with users and exploration of multimodality. We propose a semantic...
The growing evolution in the development of embedded systems has raised a numerous amount of distributed applications. Such applications have a strong tendency to integrate various types of existing devices. This trend is aligned with the ideas of ubiquitous computing, which is expected to turn devices increasingly independent of people, making the relationship between technologies more natural and...
The quest to transform the television viewing experience into a digital media service is happening thanks to the addition of companion screens to the TV. Multi-device experiences become more intuitive and easier to use federating cooperative devices. They also bring new creative opportunities to schedule and distribute interactive content synchronised with the TV programme through any connected screen...
Future Internet is foreseen to fully handle a wide range of multimedia services allowing their access trough diverse computing devices such as laptops, TVs, PDAs and 3G mobile phones interconnected via different wire-line and wireless networking technologies. Such a diversification in the computational context reinforces the need of personalized and adaptive media services towards better end-user...
This paper designs an integrated multimedia system which is able to perform intelligent controls on media devices and services in a home-based context-aware environment. In this design, this proposed system functions both of intelligent media content distribution and multimedia convergence mechanisms. Not only local media fils but enormous Internet media streams can be advertised and distributed across...
Today's mobile devices represent exceptional foundations for wide-area Internet of Things (IoT) applications. However, the vast heterogeneity of real-world environments makes it challenging for applications to sense, understand and adapt to the user's continually evolving context. We're investigating a new community-based approach for context-aware computing, where advanced context sensing capabilities...
Weiser, and Brown predicted the era of Ubiquitous Computing but what they called the most profound change has been almost completely abandoned, overlooked or misrepresented. Designing calm technology requires a deeper understanding of how we multi-task, but it has the potential to becalm human computer interaction, decreasing stress, and mitigating human error as a cause of accidents.
The current growth of mobile devices enabled with GPS receptors, cameras, accelerometers, and Internet access offers new opportunities for new mobile ubiquitous multimedia applications. Such applications help local communities to share resources using geo-location, interactive mapping, augmented reality, and several data representations. This paper presents CityEvents, a mobile solution that provides...
Traditional processes of multimedia production are generally regarded as professionally-oriented workflows, and they don't generally encompass the context of user-generated multimedia content. Taking into consideration production led by users, there is an urge for new frameworks that model end-users not only as consumers of multimedia content, but also as first-class elements in the whole multimedia...
The problem of providing an efficient and low-cost video streaming service over wireless access networks is considered in this work. The usage of multicast content delivery combined with popularity-based video caching, enables to provide video-on-demand services over wireless networks. In order to tackle the "last mile" bottleneck for video delivery to the home, we propose a content-aware...
To days internet world is full of data thieves and hackers. So, there is a need to design a system that enables the internet users to exchange their secret and private data safely across the web. Steganograhy is such a tool. It hides the user data in other kinds of data, so that no one can suspect that some sensitive data is being transferred.. Stegan PEG is an application of image steganography....
To get the best of both types of cipher symmetric using AES (Advanced Encryption Standard) and the asymmetric ECC (Elliptic Curve Cryptography) to address the Confidentiality, Authentication, Integrity and Non-repudiation issues in SCADA system. With the posted threats to SCADA systems and listed vulnerabilities in this study, a retrofit for these threats through the crossed cipher scheme is presented.
In Symmetric encryption, a secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. While is Asymmetric Encryption, two keys are used. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. These Schemes...
The routing protocols are the backbone to provide efficient call services in mobile ad hoc networks, in terms of both performance and reliability. Many routing protocols for such networks have been proposed so far. Amongst the most popular ones are Ad hoc On-demand Distance Vector (AODV), Destination-Sequenced Distance-Vector Routing protocol (DSDV), Dynamic Source Routing Protocol (DSR). This paper...
Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent...
Mobile Ad-hoc networks are characterized by constant topology changes, in the absence of fixed infrastructure and lack of any centralized control. Traditional routing algorithms prove to be inefficient in such a changing environment. Ad-hoc routing protocols such as Dynamic Source Routing (DSR), Ad-hoc On-Demand Distance Vector Routing (AODV) and Destination sequence Vector (DSDV) have been proposed...
With the development of embedded system, electrical equipments management becomes more complexities, consumption of electric energy has become more importance. A electric energy management solution is presented for managing electrical equipments via PLC in this paper, which is by means of the Utility, power and its carrier, among house equipments. An energy management model of electrical equipments...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.