The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work we analyze the complex trade-off between data transfer, computation time, and power consumption when a multi-stage data-intensive algorithm (in this case video stabilization) is split between a low power mobile device and high power cloud server. We evaluate design choices in terms of which intermediate representations should be transferred to the server and back to the mobile device,...
With the development of Artificial Intelligence, gesture recognition technology has been applied in practical schemes. We built up the Dynamic Matrix Sound system (DMS system) which makes an excellent sound field reproduction effect. However, because of the weak controllability of the large-scale system, the application of the DMS system is very limited. In order to control a DMS system by gesture,...
Mobile devices carry a number of vulnerabilities that, when exploited, can result in proprietary-data leakage, data alteration, fraudulent transactions and, in extreme cases, physical damage to the user and surroundings. Such attacks can be instigated by both outsiders and insiders, and can leverage vulnerabilities embedded in the hardware and software components of the device, as well as risky behavioral...
When establishing communication between two nodes, identification, authentication, and authorization provide the information and assurances necessary for the nodes to trust each other. A common solution for establishing trust between two nodes is to create and share credentials in advance, and then use a third-party, online trusted authority to validate the credentials of the nodes. However, the characteristics...
This paper describes CheckIt: a mobile phone based optical mark recognition(OMR) system which is used for automatic checking of the user response sheets. It exploits prior information about the OMR sheet layout, which helps in achieving high speed and accuracy. The system incorporates following interdependent modules: (i) computer vision and image processing; (ii) computer communication and networking;...
Mobile devices dominate a majority of our business and private life. The increasing number of apps and powerful hardware ensure high demand and a growing usage rate. Based on the device sizes, the space for hardware is limited and this fact impacts battery size and, therefore, battery life. Mobile phone vendors look for ways to increase battery life through hardware and software features. This paper...
The article describes an online laboratory for a wide range of automated control systems researches with video stream in real time. The online laboratory, based on a DC motor, is an open source, suitable for modern mobile devices and it also does not require additional client software.
Web-based multi-screen digital signage system is designed to show a multimedia content via multiple signage screens which are connected by a network. In this demonstration, a novel method to control multi-screen digital signage is proposed. The proposed method uses standard web technologies to display same contents and seamless moving each devices screen.
Reverse Nearest Neighbour queries is known for the heavyweight algorithm that makes it difficult to be implemented in mobile devices due to high computations needed to verify the objects. Since the rapid development of mobile devices' hardware and also the new lightweight approach in solving the Reverse Nearest Neighbour problem, this problem can be solved in mobile devices. In this paper, we implemented...
The emerging technology of transparent computing has provided a new perspective of resource sharing and management due to the separation of computation and storage in this mode. In this paper, we introduce a framework of mobile transparent computing (MTC) by efficient integration of transparent computing and mobile computing. The MTC environment is a kind of decentralized networks that consist of...
Recently, the fact that mobile devices with various kinds of hardware and software platforms constantly appear on the market has resulted in huge amount of mobile applications coming out based on different platforms. Thus a big challenge has emerged to design applications on the heterogeneous devices and operating systems (OSes). This paper proposes a completely cross platform mobile transparent computing...
The proliferation of social networks and Internet-enabled mobile devices has allowed people to stay in touch with friends, and thus open up the potential of many novel human-centric applications. We propose one such application called Mutual Assistant Network (MAN). MAN allows people to ask for assistance from other people in a specific region, and share the local and timely information that cannot...
People visiting a foreign city are often not comfortable with the public transport system. This paper describes a system designed help passengers not only to find a suitable route but also to identify the correct bus. Different ways for recognising buses are explained and examined for practicability in the city of Berlin. An actual test case for the best fitting scenario was created and tested in...
In today's world, ensuring security for important locations is a burning issue. Different surveillance methodologies such as alarm system, CCTV, PC based video system are used to ensure this security. But using all these systems, it is not possible for a person to monitor the security of his or her desired location when they are outside. Now-a-days anybody can communicate with anyone at anytime around...
Along with the development of mobile E-commerce, its security problem received more and more attention, and becomed the main factor that affects its development. To address this, we proposed a new Mobile E-commerce system solution that can be used for mobile payment without changing mobile device hardware configuration by connecting to an special and exteral security electronic device. This electronic...
Augmented Reality Systems (ARSs) are a logical evolution of virtual reality systems. This new type of system enriches reality by mixing real elements with electronic information. This paper identifies the common tasks performed by ARSs, the underlying software and hardware components that support them and the most common architectures for ARSs. Subsequently, the paper reviews some ARSs, identifying...
The use of mobile and handheld devices is a desirable option for implementation of user interaction with remote services from a distance. Another prominent option to operate a remote application is the use of gestures performed in the air. This paper describes the design and realization of a system to enable mobile devices and gesture recognition tools to have control on a remote movie-player application...
Internet users today often have usernames and passwords at multiple web sites. To simplify things, many sites support some form of federated identity management, such as OpenID, that enables users to have a single account that allows them to log on to many different sites by authenticating to a single identity provider. Most identity providers perform authentication using a username and password....
Ubiquitous Computing has the main goal of building computer systems that support and facilitate the daily lives of users, without being intrusive. This paper follows a perspective that advocates a cautious and iterative approach to the vision of Ubiquitous Computing. In this context, it is presented a system with a particular application goal, based on a proposal of a generalized infrastructure and...
The first aid and immediately help are very important in an accident. The earlier detection and treatment we do, the better prognosis and health patients have. In the senior populations, it is more important. Once seniors have an accident, not only physically injure in their body, but also mental and social ability, and may have severe sequela. Concerning about these populations, this research design...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.