The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, with the transformer substations basically unattended, a new topic for the security of power equipments and electric power lines is presented. Many alarm systems based on ac high-voltage grid, electronic pulse fence or infrared electronic fence have been installed in substations. In this paper, we propose an intelligent anti-theft alarm system based on laser fence and wireless communication...
In order to solve the problem of temperature monitoring location being difficult to monitor in more remote and dispersed geographical location, design a wireless monitoring system. It adopts 32-bit ARM controller LPC2114, uses AT commands and GSM public network SMS(Short Message Service) platform to control SMS module TC35i in the form of short message to transmit data, and it's receiving circuit...
With the evolution and significant growth in wireless technology and the development of mobile commerce, businesses can achieve superior performance through the implementation of platforms for mobile payment. However, there are several platforms for mobile payment to choose from which makes the selection of an appropriate platform for specific applications a challenging task. In response to this challenge,...
This paper reports on the work on a new service using text mining on SMS data: SMSTrends. The service extracts trends in the form of keywords from SMS messages sent and received by ad hoc location-based communities of users. Trends are then presented to the user using a phone widget, which is regularly updated to show the latest trends. This allows the user to see what the user community is texting...
In Japan, the number of elderly persons who take medicine regularly has been increasing due to population aging. Since they can have the serious accidents caused by incorrect medication, we propose a medication monitoring system to detect incorrect medication. The system is composed of an intelligent medicine case, house-embedded sensors, and a database server. The case recognizes whether an elderly...
Mobile communication has been dominated by vertically integrated service provision in an `operator centric model', which has been highly bound to voice and SMS services and organized in a monopolistic competition between few Mobile network operators, MVNOs and SPs. In the recent years we have witnessed a radical change driven by the introduction and further development of smartphones, where we see...
SPam over Instant Messaging (SPIM), is becoming one of the major challenges for the IM Networks. These messages affect the overall performance in various ways, ranging from waste of resources e.g. Memory, unwanted traffic on the Network, to major disasters e.g. spread of worms, DoS attacks etc. Different techniques have been proposed for the detection of SPIM; based on content-based searches, feature...
Charging large numbers of Plug-in Electric Vehicles may result in overloading sections of the electric power grid at certain times of the day. Smart grid technologies can be used to delay charging or regulate charging rates, enabling the existing power system to handle the increased load without having to increase peak power capacity of feeders or add generation. A key component of the Smart Grid...
SMS communication is gaining increasing popularity in people's daily life. Along with the growing number of times people sending and receiving SMSs every day, there are also increasing unwanted interruption to people when they are busy with their work or feel less receptive to unimportant messages. Unfortunately, current SMS systems are unable to present notifications according to user's states and...
The following study was an attempt to investigate the effect of providing co-curricular activities using an m-learning method, i.e., SMS on a group of female Iranian high school juniors' learning during a course of mathematics. A hundred students were divided into four groups of 25, two of which received treatment, i.e. they were sent math quizzes and were provided with feedback by the teacher via...
We study the Gaussian multiple-input multiple-output (MIMO) wiretap channel, which consists of a transmitter, a legitimate user, and an eavesdropper. In this channel, the transmitter sends a common message to both the legitimate user and the eavesdropper. Moreover, the legitimate user receives a private message, which is desired to be kept hidden as much as possible from the eavesdropper. We obtain...
As Short Message Service (SMS) is now widely use as business tool, it security has become a major concern for business organizations and customers. There is a need for an end to end SMS Encryption in order to provide a secure medium for communication. This paper evaluates RSA, ELGamal and Elliptic curve encryption techniques using random SMS messages of various sizes to measure their encryption and...
With the explosive international growth in mobile phone adoption, there is an increasing number of text message-based applications providing mission-critical services to mobile phone owners. With such an unexpected leap in the mobile subscriber base, questions have arisen over the reliability of Short Message Service (SMS) as a communication channel in regions of high mobile teledensity growth. This...
In peer-to-peer (P2P) applications, a group of multiple peer processes (peers) are required to cooperate with each other. In this paper, we discuss a heterogeneous hybrid time group communication (HHT) protocol which takes advantage of the linear time (LT) and physical time (PT) to causally order messages in a scalable heterogeneous group. It depends on accuracy of each physical clock and minimum...
The radical growth of internet & cybercrime during the last few years has forced us to think about how to improve information security efficiently during communication. Protecting the information during communication via the internet is the major challenge against eavesdropper. Encryption is a widely used technique to ensure secure communication; however, sending encrypted messages often draws...
Real-time monitoring of temperature has become crucial in cases like server room, incubators of infants in hospitals, coal mines, green houses etc. In all these cases we prefer a temperature sensor which ensures user's safety, proper alarming conditions, be simple to use (user friendly), easy calibrations, small and light weight, inexpensive and effective. The aim of this system is to provide an effective...
As is needless to say; a majority of accidents, which occur, are due to drunk driving. As such, there is no effective mechanism to prevent this. Here we have designed an integrated system for the same purpose. Alcohol content in the driver's body is detected by means of an infrared breath analyzer placed at the steering wheel. An infrared cell directs infrared energy through the sample and any unabsorbed...
SIP-based instant messaging (IM) is currently a quite hot issue in the SIP world. Two approaches, pager-mode IM and session-mode IM, have been explored for implementation. This paper provides an in-depth analysis of the first method through an example, and makes improvement to the second by presenting specific signaling and media messages. Solutions to security problems are also discussed in detail...
With the high-spread of 3rd Generation Mobile Communication Technology, on 3G network, the number of junk information has increased rapidly. Much pornographic and junk information have flooded 3G network and become a serious social problem. It becomes necessary to filter all exchanged information quickly and efficiently. An improved Bayesian filtering algorithm is proposed to classify text messages...
A design of vending machine based on the short massage payment with the main control module M68HC11 and GPRS module MC35 has been illustrated. This paper describes the working program of the system and especially the MDB bus and photoelectric conversing circuit and MC35 module are presented. A structure of vending machine is designed, the hardware ideas of bus conversion interface, the software protocol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.