The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies; but it also comes with its...
A major concern of the large-scale deployment of location based services (LBSs) is the safeguards of the user's location data collected by service providers, since person's location information may imply sensitive private information. Most existing techniques have addressed privacy protection mainly for snapshot queries. However, providing anonymity for continuous queries is important, since users'...
Waste management in Urban Cities of India is a serious concern with growing amounts of uncollected garbage on the streets. In this paper, we present a mobile application based solution to empower the citizens to report instances of uncollected garbage and draw the attention of authorities. Our application has been successfully deployed and has seen more than a million complaints registered across...
The Indian ‘smart cities’ have burgeoning population consuming the intelligent systems running over the city infrastructure and services. One critical set of such services is that of the emergency services involving Ambulances, Police and Firefighters. The services provided by these officials are often time critical, which makes their easy and quick availability a must have attribute. This paper proposes...
From process formulation, welding production to quality inspection, welding quality management needs the cooperation of many departments. In actual production, the repeated works, omissions, and other problems of the establishment of welding procedure specification (WPS) occur from time to time. Dynamic changes of welding current and voltage signals can reflect the performance of electric arc; unstable...
Data acquisition systems for large-scale high-energy physics experiments have to handle hundreds of gigabytes per second of data, and are typically implemented as specialized data centers that connect a very large number of front-end electronics devices to an event detection and storage system. The design of such systems is often based on many assumptions, small-scale experiments and a substantial...
Vehicle tracking systems which receive the location data from tracking devices fitted in vehicles, visualize the location of vehicles on a web map and generate reports based on the location data. Tracking applications are commonly used for various purposes such as Fleet Management, Asset Tracking, Transit Tracking, Fuel monitoring etc. The GIS views of fleet management applications are limited to...
In order to achieve sustainability in the context of advances in science and technology, it is necessary to transform the traditional tourist attractions into smart tourist attractions by combining smart and information technologies with scientific management. Navigation and guide is an important module of smart tourist attraction. A navigation and guide service system based on smart phone is proposed...
Practical education about information security is needed for system developers and administrators in Web service suppliers. We propose a hacking contest CTF as attack and defense style with a website for a multiple online game. The contest organizer prepares a game server site as a contest environment which contains several vulnerability. The contest participants are divided into an attacker team...
Cloud services are the most widely used services. From different services of cloud, data storage service is the most popular one. Generally, in traditional way data stored on cloud and user can fetch data from cloud but if data can be stored in encrypted format security of data will get increased. We are using encryption algorithm for this purpose. Our aim is to secure the data as well as we don’t...
This paper presents an innovation in the implementation of RFID in terms of authentication and offline intelligent payment system in public transport, Bus Rapid Transit (BRT), for the academicians. The authentication is conducted using a contactless smart card as an e-ticket as well as an identity card. Contactless smart cards can be obtained through the registration process on the administrator to...
Due to the high cost and high power consumption problem of the present smart home server, we designed and implemented a home server based on embedded system, mainly developed by ARM11 for a hardware platform, Linux system for operating system, SQLite database and BOA server for a software platform. The home server has successfully implemented the network communication, SQLite database peration and...
As the developing of Beidou navigation positioning technology and the wireless Internet, the demand of the mobile phone location service is increasingly urgent. And the location information sharing between each other becomes an important research focus, and also the core of the current location based service (LBS) software. At present, all the related LBS software is based on C/S architecture, developed...
SQL Injection Vulnerability (SQLIV) has been the top-ranked threat to the Web security consistently for many years. Penetration tests, which are a most widely adopted technique to detect SQLIV, are usually affected by testing inaccuracy. This problem is even worse in inferencebased, blind penetration tests for online Web sites, where Web page variations (such as those caused by inbuilt dynamic modules...
This paper proposes a novel approach for visual query compression with a bank of transforms selected on Grassmann manifold. Instead of using single transform and quantization pipeline for all the features extracted from an image, we group the key point features according to their local embedding subspace geometry and organize them into different leaf nodes of a KD-Tree which was built from a large...
In-home IoT devices play a major role in healthcare systems as smart personal assistants. They usually come with a voice-enabled feature to add an extra level of usability and convenience to elderly, disabled people, and patients. In this paper, we propose an efficient and privacy-preserving voice-based search scheme to enhance the efficiency and the privacy of in-home healthcare applications. We...
Physical exercising has always had an important impact on humans' health. Lack of motivation is one of the major reasons that keeps a person from exercising. To overcome this problem, new solutions are needed to provide weight watchers and fitness seekers motivation to exercise indoors. This paper presents iGym, a low cost and flexible system that enhances humans' workout experience. This system lets...
Database driven web applications are some of the most widely developed systems today. In this paper, we demonstrate use of combinatorial testing for testing database supported web applications, especially where full-text search is provided or many combinations of search options are utilized. We develop test-case selection techniques, where test strings are synthesized using characters or string fragments...
This paper presents an architecture to provide endto- end per-user services with support to client mobility, designed according to the SDN and NFV paradigms. Our service platform dynamically configures and launches service requests when the client connects to the network, which are used by a multidomain orchestration system to arrange the required network configuration and computational resources...
In this work two approaches of backward chaining inference implementation were compared. The first approach uses a classical, goal driven inference running on the client device — the algorithm implemented within the KBExpertLib library was used. Inference was performed on a rule base buffered in memory structures. The second approach involves implementing inference as a stored procedure, run in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.