The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Soft keyboard is perhaps the most common human input device on smartphone. This study designed and implemented a proof-of-concept soft keyboard keylogger in Android. The soft keyboard app was designed to have the capability to capture keystrokes from user and save it. It also can record the GPS location of user at the time of typing and sent it to a remote server. From our testing, the app was capable...
With the increased connectivity of computer devices including mobile devices to the Internet, the volume as well as the type of information that moved through organization network perimeter are also growing significantly. Consequently, this has heightened information security threats to organizations that rely on the Internet to do their businesses. On the other hand, Intrusion Detection System (IDS)...
Keylogger is a dangerous device that can capture all word that typed on the keyboard. There are two kinds of keylogger, it is hardware and software keylogger. It is very easy to detect them because both of them already listed as a malware. There are a lot of antivirus application that can detect software keylogger and for the hardware keylogger, it is easily can be seen if there is a strange thing...
The increasing number of construction of houses in Indonesia would lead to an increase in the number of national electricity consumption. Electricity usage should be done more efficiently so that electricity is not wasted in vain. The development of today's information technology should be used as a solution to these problems. In this research tries to create a system that can be used to simplify...
Migrating to the cloud is becoming a necessity for the majority of businesses. Cloud tenants require certain levels of performance in aspects like high availability and service rate and deployment options. On the other hand, Cloud providers are in constant pursuit of a system that satisfies client demands for resources, maximizes availability, minimizes power consumption and, in turn, minimizes the...
In this research, a smart wireless street lighting system (SWSL) based on wireless communication using ZigBee configuration is designed, implemented, and analyzed. The proposed SWSL system which is equipped with sensors (light sensor, motion sensor, current and voltage sensor), time readers and the microcontroller so that the system is able to regulate its function automatically according to the time...
Bugs reports and version archives are two useful sources of information for quality analysts, with the goal of mapping the bugs fixes to source code files. Manually performing this task is as arduous as it is time consuming. We propose a tool which programmatically performs this job in two phases-First, it filters relevant log entries by traversing CVS/SVN log files and then it parses the textual...
Recently, there has been an increasing need for secure, efficient and simple notification methods for mobile systems. Such systems are meant to provide users with precise tools best suited for work or leisure environments and a lot of effort has been put into creating a multitude of mobile applications. However, not much research has been put at the same time into determining which of the available...
The Mobiab system is complex system for diabetes mellitus compensation. This system is designed as client-server with mobile application and web portal. The application can collect data about patient's caloric intake and expenditure, can communicate via Bluetooth with glucose meter, tonometer and scales. The mobile application is using gamification principles for patient's positive motivation. The...
Usability of educational applications is essential for the effectiveness of the learning environment. Nowadays, these applications are developed on mobile devices since their use widespread rapidly. Considering these applications would be used by children, usability evaluation methods to be used would be different than conventional methods. In this study usability evaluation of a mobile hand-writing...
Business critical web applications are the most popular services provided to the client by the financial sector. These applications are bringing handsome revenue for the financial industry every year. These services are also a frequent target of attackers. Poor coding practice leads applications to vulnerability that are exploited by attackers. Information and privileges such as access to databases,...
Police departments and other law enforcement agencies have integrated a greater number of video cameras into their daily routines. This has introduced with it the problem of moving and processing vast amounts of video data. In this work, we take a look at some of the associated problems and our own attempts to address them. We first analyze the physical network and infrastructure at Temple University's...
With the rapid advance of mobile computing technology and wireless networking, there is a significant increase of mobile subscriptions. This brings new business requirements and demands in mobile software testing, and causes new issues and challenges in mobile testing service. In this paper, informative and insightful discussions about cloud-based mobile testing-as-a-service (Mobile TaaS) are offered,...
We are moving towards a general public where web is the need of hour. Today the vast majority of the product applications executed, are composed as online applications which are keep running in a web program. Testing programming applications is critical. Numerous associations make utilization of a specific web application, so the same web applications are tried habitually by diverse clients from distinctive...
A physical security is best described as securing the perimeter of an area. Most organisation tends to focus on securing their data over the wires and overlooked threats coming from inside their premises. Servers are protected with maximum security configurations and firewall, however the server room are accessible by unauthorized personnel, access card often left behind, broken or missing main door...
The paper deals with theoretical and experimental issues of an idea towards a cloud-based Wizard of Oz in the Microsoft Azure cloud environment. Wizard of Oz is a common tool in social robotics and especially in specific applications like mental illness treatment, ambient assisted living, and many others. The final goal is to create a system with the ability to learn and replace a human wizard by...
Robot Framework is a generic test automation framework based on keyword-driven and has been widely used in the automated testing of server. In this paper, Robot Framework is extended by test libraries to include some features in order to meet the demands of server testing, and the extended framework is used to execute the automated installation testing of server drives and firmware. Finally, analysis...
Robot Framework is a generic test automation framework based on keyword-driven and has been widely used in the automated testing of server. In this paper, Robot Framework is extended by test libraries to include some features in order to meet the demands of server testing, and the extended framework is used to execute the automated installation testing of server drives and firmware. Finally, analysis...
This paper presents a test framework for a large-scale message broker system for consumer devices, where communication is between devices and goes through a message broker. In testing such a system, administering tests is a burdensome task, because a tester has to design and operate a test application managing multiple connections and to validate complicated traffic patterns between clients via a...
This paper presents a web based system for remote monitoring and control of set-top boxes. The goal of the proposed system is to provide flexible control over set-top box from remote location, in order to enable test engineers, test technicians and developers to remotely access set-top box and execute different tests on it. By using the proposed system it is possible to save resources and shorten...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.