The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a system that provides the indoor location of an emergency 9-1-1 caller who uses a smart-phone while inside a large, multi-story building. The system consists of an Array of BlueTooth Low Energy (BLE) beacons and a Database that together provide the indoor location, and a Smartphone Application that obtains the location information and makes an IP-based call, including the indoor...
This paper proposes a general framework that allows to identify a video in real time using perceptual image hashing algorithms. In order to evaluate the versatility and performance of the framework, it was coupled for a use case about ads tv monitoring. Four Perceptual Image Hashing (PIH) algorithms were subject to a benchmarking process in order to identify the best one for the use case. This process...
This paper presents an evaluation of an experiment conducted on a server to analyse how horizontal scalability affects its performance. This paper studies the results obtained by measuring response times and processing times when dealing with many requests by adding more machines to the system. This paper presents the technologies used to build this system of machines as well as the results obtained...
Visualization of the micro video big data refers to the intuitive display of the obtained data on micro videos across the Internet for the purpose of helping users to understand the message in the data. This paper describes the implementation of a micro video big data visualization system in detail, which has four steps: determine the visualization objective, choose data based on the objective, display...
It is estimated that, nowadays, around 40 records containing private data are leaked every second. Many of these illegally obtained records are due to the lack of security measures taken into consideration. One of the biggest mistakes that can be done, when it comes to data security, is to store data in plaintext, because a vulnerability that gives an attacker access to the database may result in...
In this paper, a hybrid broadcast broadband TV (HbbTV) test system with the automatic testing subsystem is proposed. The proposed system is based on Node.js framework with SQLite database on the backend side and Polymer framework on the front-end side. The paper covers basic testing metodology and design process with the emphasis on the implementation and testing.
Global Positioning System (GPS) is one of famous technology which applied for outdoor localization. Unfortunately, GPS has lacked in accuracy while it uses in indoor environments. Fingerprint is a method enriched with lots of received signal strength. This method is used for mapping the observation area, and it is suitable for indoor application such as crowdsources tracking moving object in indoor...
The need for fast, reliable and sustainable means of communication is on the rise. Beacons are all set to revolutionize the industry with its immense potential and the ability to be deployed almost anywhere to offer an enhanced user experience. In this paper, we design and validate a context aware content delivery system using a Raspberry Pi which plays the role of a beacon. A local database has been...
“Smart Weight Based Toll Collection & Vehicle Detection During Collision using RFID” addresses the problems faced at the toll plaza. The system also identifies the vehicles against which stolen and accident cases are registered using RFID. Initially user has to create an account and register his RFID number at central database using the mobile application. When a vehicle with RFID tag passes through...
This work presents security solutions related to multi-sensor closed-loop artificial pancreas (AP) systems. The proposed AP system is built on a heterogeneous platform incorporating a smartphone, activity sensors, a glucose monitor, an insulin pump, a laptop hosting the multi-variable control algorithm and a cloud server. Developing a secure AP system is essential for mass adoption among diabetes...
It is difficult to assess the security of modern enterprise networks because they are usually dynamic with configuration changes (such as changes in topology, firewall rules, etc). Graphical security models (e.g., Attack Graphs and Attack Trees) and security metrics (e.g., attack cost, shortest attack path) are widely used to systematically analyse the security posture of network systems. However,...
We report on our research on proving the security of multi-party cryptographic protocols using the EASYCRYPT proof assistant. We work in the computational model using the sequence of games approach, and define honest-butcurious (semi-honest) security using a variation of the real/ideal paradigm in which, for each protocol party, an adversary chooses protocol inputs in an attempt to distinguish the...
The explosion of web-based GIS technologies and the opening up of mapping services to citizens in the past decade have resulted in a whole range of Volunteered Geographic Information (VGI) communities like OpenStreetMap, Ushahidi, and Wikimapia, which are used to assist emergency management operations on a large scale. However, many crowdsourcing systems for disaster recovery have multiple obstacles...
More and more personal information is stored in the smart phone, especially including the photos and pictures. It is important to manage these numbers of rapid growth photos in smart phone. In this paper, we develop an intelligent photo management system used for android phone, namely i-Memory. The key function mainly includes the basic function of classify based on time and location, the advanced...
This paper presents the design and implementation of an Internet of Thing (IoT)-based system for indoor localization using Bluetooth Low Energy (BLE) technology. Our solution consists of two main systems: an acquisition system and a central server, under the Client-Server paradigm and the IoT philosophy. We report the development of different modules: measurement (Bluetooth beacons), data aggregation...
The purpose of this paper is to present a smart interactive mirror interface. In this paper, we describe the design and development of a futuristic mirror that offers simplified and customisable services to the home environment. On a par with the recent advances in the Internet of Things standards and applications, the mirror is designed to enable residents to control the household smart appliances...
Nowadays the most used applications are the web based applications, for instance long range informal communication, shopping, e-learning, banking and social networking are all an examples of web based applications. It is commonly known that these Web applications are publicly available for all users around the world. This leads us to new challenges in securing these applications and exposing them...
Battery Simulator is a kind of test equipment commonly used in satellite power, electric vehicles and other power application fields. Design a battery simulator with a standard LXI bus interface is important for building a multi-instrument test system. This paper puts forward a SCPI instruction analytical platform based on LXI bus. Remote PC sends SCPI command over LXI bus. The communication board...
The system from the point of view, follows the principles of the software engineering of. Net framework and ASP web design technology, data mining technology, the XML data description and manipulation techniques in legal business training system application, using the prototype method and object-oriented system analysis method, a comprehensive analysis of the legal practice teaching business functional...
Cloud computing is undoubtedly considered one of the most discussed topics in recent times, both in the research and business sectors. Various schools of thought have attempted to provide a fitting definition from many aspects. This computing paradigm can be defined as a web-based computing model designed to allow both off-site storage and easy data and digital file sharing. The SQL injection, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.