The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart space is created by deploying a Semantic Information Broker (SIB) in a given Internet of Things (IoT) environment. The deployed SIB enables information sharing for many digital devices participating in the IoT environment. In this study, we consider CuteSIB — a new SIB implementation for the Smart-M3 platform, where the class of SIB host devices covers various embedded and mobile devices, in...
Location-awareness plays an important role in Wireless Sensor Networks (WSNs) by aiding in tasks such as packet routing, event mapping, and energy savings. The use of Global Positioning System (GPS) on sensor nodes is not always viable due to a number of issues, e.g., power constraints. Location estimation solves the problem of computing sensor node positions by using information from devices that...
Mobile games have come to revolutionize the mobile handset and gaming industry, pushing chip vendors to compete in order to provide better and better graphics capabilities by means of dedicated processors. This capability coupled with the sensing and communication ability offered by smartphones, provides the developers with the building blocks for innovative gaming solutions. In particular, multiplayer...
This paper considers the problem of Base Station power minimization in downlink Orthogonal Frequency Division Multiple Access (OFDMA) systems. It aims at providing new solutions for the reduction of the total energy consumption. Such solutions rely on joint subcarrier and power allocation, under the constraints of requested per-user data rate. Practical results show that the proposed techniques allow...
This paper presents the user-centered design methodologies applied in the ILOCALAPP project, with the aim of designing and developing a mobile application which applies the incidental learning paradigm in the field of foreign cultures and languages. Such methodologies are strongly based on stakeholders' consultations, by involving potential end-users in a dialogue that plays a crucial role in identifying...
A belt region is said to be k-barrier covered by a set of sensors if all paths crossing the width of the belt region intersect the sensing regions of at least k sensors. Barrier coverage can be achieved from a random initial deployment of mobile sensors by suitably relocating the sensors to form a barrier. Reducing the movement of the sensors is important in such scenarios due to the energy constraints...
Virtual worlds and avatar-based interactive computer games are a hype among consumers and researchers for many years now. In recent years, such games on mobile devices also became increasingly important. However, most virtual worlds require the use of proprietary clients and authoring environments and lack portability, which limits their usefulness for targeting wider audiences like e.g. in consumer...
In recent years, mobile terminals come to be used to assist works. However, we can not say that they are enough suitable to assist works either that occupy hands or that are accomplished in environment with water or fire, which cause troubles with electronic devices. In this study, in order to solve this problem, we propose an assist system using projection mapping and NUI. Note that our system is...
Nowadays, the need to tackle rapidly increased crimes is increasing day by day to help ensuring justice. Digital forensics can be defined as the process of collecting, examining, analyzing and reporting of digital evidence without any damage. Digital forensics requires a detailed examination of devices such as computers, mobile phones, sim cards, tablets that contain digital evidence regardless of...
In the large-scale Wireless Metropolitan Area Network (WMAN) consisting of many wireless Access Points (APs),choosing the appropriate position to place cloudlet is very important for reducing the user's access delay. For service provider, it isalways very costly to deployment cloudlets. How many cloudletsshould be placed in a WMAN and how much resource eachcloudlet should have is very important for...
Testing of mobile applications becomes more importantas the usage of smartphones increases. Many studiesuse Monkey, a basic testing tool provided by Android. WithMonkey, however, it is hard to replay the behavior of actualusers. In this work, we present a mobile app testing methodthat automatically records and replays user event logs on thesmartphone. From replay testing experiments, we have shownthat...
While wearable devices have been the buzzword inthese days, they are still in the infant market stage. Thoughdemand for wearable devices has skyrocketed, the early abandonmentof devices become an important issue. Many studiesexamine the usage of wearable devices with user survey. However,it is essential to look at the real behavior of wearable users howand why wearable users enjoy or abandon devices...
Recently, real-time locating system (RTLS) with centimeter accuracy using radio frequency signal is available for commercial deployment with the use of ultra-wideband (UWB) technology. One of the commercial UWB real time locating systems in the market now is DecaWave's DW1000 IC which utilizes two-way-ranging (TWR) mechanism to measure accurate distance between an anchor and a tag. Then, a trilateration...
There has been a recent rapid increase in the number of Internet of Things (IoT) devices, providing a wide range of services for smart homes such as surveillance cameras, smart lighting, and door locks that can be remotely accessed and controlled. User mobility makes static security mechanisms, such as usernames and passwords, tedious to use. In this paper, we introduce a context-aware authentication...
The smart use of the radio spectrum is viable with the use of Cognitive Radio (CR) techniques and Software Defined Radio (SDR) hardware. With that, this project aims to detect and utilize vacant TV channels for secondary users. The lack of spectrum sensing techniques and methods to identify the state of the TV spectrum in a particular time and location is a problem which is delaying the effective...
Academic advising of students is a task that requires a lot of time, expertise, and intellectual investments from the academic advisor. In order to help students to find a suitable decision in short time and effort, this project implements an Intelligent Algorithm in order to design an expert application on smart phone. The proposed system was implemented and tested for validation with real data that...
Cloud infrastructures are extremely flexible and powerful, but their data centers are located very far from the end users. To address the limitations of these systems, many researchers are designing mobile edge clouds which complement traditional clouds with additional resources located in immediate proximity of the end users. However, currently there exists no open-source mobile edge cloud implementation...
Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and enormous research efforts have been dedicated to the development of e-learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is low. One of the reasons is the low study desire and motivation. In this work, we...
In [1]–[3], the concept of perfect location privacy is defined and sufficient conditions for achieving it were obtained when anonymization is used. In this paper, necessary conditions for perfect privacy are obtained. Specifically, we prove that the previous sufficient bounds are tight, and thus we obtain the threshold for achieving perfect location privacy using anonymization. First, we assume that...
Recent device shipment trends strongly indicate that the number of Web-enabled devices other than PCs and smart phones are growing rapidly. Marking the end of the dominant era of these two traditional device categories, people will soon commonly use various types of Internet-connected devices in their daily lives, where no single device will dominate. Since today's devices are mostly standalone and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.