The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this research, a smart wireless street lighting system (SWSL) based on wireless communication using ZigBee configuration is designed, implemented, and analyzed. The proposed SWSL system which is equipped with sensors (light sensor, motion sensor, current and voltage sensor), time readers and the microcontroller so that the system is able to regulate its function automatically according to the time...
Bugs reports and version archives are two useful sources of information for quality analysts, with the goal of mapping the bugs fixes to source code files. Manually performing this task is as arduous as it is time consuming. We propose a tool which programmatically performs this job in two phases-First, it filters relevant log entries by traversing CVS/SVN log files and then it parses the textual...
Recently, there has been an increasing need for secure, efficient and simple notification methods for mobile systems. Such systems are meant to provide users with precise tools best suited for work or leisure environments and a lot of effort has been put into creating a multitude of mobile applications. However, not much research has been put at the same time into determining which of the available...
The Mobiab system is complex system for diabetes mellitus compensation. This system is designed as client-server with mobile application and web portal. The application can collect data about patient's caloric intake and expenditure, can communicate via Bluetooth with glucose meter, tonometer and scales. The mobile application is using gamification principles for patient's positive motivation. The...
Usability of educational applications is essential for the effectiveness of the learning environment. Nowadays, these applications are developed on mobile devices since their use widespread rapidly. Considering these applications would be used by children, usability evaluation methods to be used would be different than conventional methods. In this study usability evaluation of a mobile hand-writing...
Business critical web applications are the most popular services provided to the client by the financial sector. These applications are bringing handsome revenue for the financial industry every year. These services are also a frequent target of attackers. Poor coding practice leads applications to vulnerability that are exploited by attackers. Information and privileges such as access to databases,...
Police departments and other law enforcement agencies have integrated a greater number of video cameras into their daily routines. This has introduced with it the problem of moving and processing vast amounts of video data. In this work, we take a look at some of the associated problems and our own attempts to address them. We first analyze the physical network and infrastructure at Temple University's...
With the rapid advance of mobile computing technology and wireless networking, there is a significant increase of mobile subscriptions. This brings new business requirements and demands in mobile software testing, and causes new issues and challenges in mobile testing service. In this paper, informative and insightful discussions about cloud-based mobile testing-as-a-service (Mobile TaaS) are offered,...
We are moving towards a general public where web is the need of hour. Today the vast majority of the product applications executed, are composed as online applications which are keep running in a web program. Testing programming applications is critical. Numerous associations make utilization of a specific web application, so the same web applications are tried habitually by diverse clients from distinctive...
A physical security is best described as securing the perimeter of an area. Most organisation tends to focus on securing their data over the wires and overlooked threats coming from inside their premises. Servers are protected with maximum security configurations and firewall, however the server room are accessible by unauthorized personnel, access card often left behind, broken or missing main door...
The paper deals with theoretical and experimental issues of an idea towards a cloud-based Wizard of Oz in the Microsoft Azure cloud environment. Wizard of Oz is a common tool in social robotics and especially in specific applications like mental illness treatment, ambient assisted living, and many others. The final goal is to create a system with the ability to learn and replace a human wizard by...
Robot Framework is a generic test automation framework based on keyword-driven and has been widely used in the automated testing of server. In this paper, Robot Framework is extended by test libraries to include some features in order to meet the demands of server testing, and the extended framework is used to execute the automated installation testing of server drives and firmware. Finally, analysis...
Robot Framework is a generic test automation framework based on keyword-driven and has been widely used in the automated testing of server. In this paper, Robot Framework is extended by test libraries to include some features in order to meet the demands of server testing, and the extended framework is used to execute the automated installation testing of server drives and firmware. Finally, analysis...
This paper presents a test framework for a large-scale message broker system for consumer devices, where communication is between devices and goes through a message broker. In testing such a system, administering tests is a burdensome task, because a tester has to design and operate a test application managing multiple connections and to validate complicated traffic patterns between clients via a...
This paper presents a web based system for remote monitoring and control of set-top boxes. The goal of the proposed system is to provide flexible control over set-top box from remote location, in order to enable test engineers, test technicians and developers to remotely access set-top box and execute different tests on it. By using the proposed system it is possible to save resources and shorten...
This paper proposes one way of integration of ZigBee protocol in a home automation system. Also, this paper has novel approach for adding ZigBee "of-the-shelf" devices from different manufacturers in the system. The concept define a device as a set of services witch that device provides. Validation and implementation of these concepts are demonstrated in this paper.
As most of the malware nowadays use Internet as their main doorway to infect a new system, it has become imperative for security vendors to provide cloud-based solutions that can filter and block malicious URLs. This paper presents different practical considerations related to this problem. The key points that we focus on are the usage of different machine learning techniques and unsupervised learning...
Agile cost management provides simple steps or process compared to the traditional cost management. Since, most of the companies are using Agile method in their development project, agile cost management becomes more significant to look into because the way people manage a cost can be more effective and efficient. Therefore, this paper proposed the prototype development of Agile Cost Management Tool...
The boundary devices, such as routers, firewalls, proxies, and domain controllers, etc., are continuously generating logs showing the behaviors of the internal and external users, the working state of the network as well as the devices themselves. To rapidly and efficiently analyze these logs makes great sense in terms of security and reliability. However, it is a challenging task due to the fact...
Along with the development of technology at this era, the need of Internet access service as a media of communication is increasing. This increasing led to anomalies in network traffic. These anomalies, can occur because of a Distributed Denial of Service (DDoS) that deliberately. The impact of an anomaly is to make the user cannot access the internet service. If left alone, these anomalies can be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.