The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
ERP to cloud integration is a widely debated topic, especially in the — so popular nowadays — cloud and mobility context. This article introduces a cloud based field service management solution that integrates with ERP back offices. To increase commercial adoption and obtain ERP vendor independence, a generic integration application is proposed, that abstracts communication complexity, decreases prototyping...
The estimated accuracy of an algorithm is the most important element of the typical biometrics research publication. Comparisons between algorithms are commonly made based on estimated accuracies reported in different publications. However, even when the same dataset is used in two publications, there is a very low frequency of the publications using the same protocol for estimating algorithm accuracy...
This report presents results from the Video Person Recognition Evaluation held in conjunction with the 8th IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS). Two experiments required algorithms to recognize people in videos from the Point-and-Shoot Face Recognition Challenge Problem (PaSC). The first consisted of videos from a tripod mounted high quality video camera...
Facing today's increasingly serious health problems, we designed and implemented an Android-based health and healthcare system, with a view to helping mobile users develop healthy living habits and enhance their health awareness. The system uses C/S mode and HTTP protocol as the communication protocol. The client consists of five functional modules and uses Volley to access network. The data of client...
In presented paper we describe a design and implementation of an information system based on base of embedded client and Linux application server architecture. Presented information system serves for remote collection, storing and processing information on the number of carried out mechanical cycles for group of older existing fatigue test machines in an automotive components production. This upgrade...
To guarantee fault tolerant system, checkpointing protocols are usually run to save the last consistent state of the system. This information will be recovered whenever a node failure occurs, thereby making it possible to resume the execution of the system. In the context of MANETs, checkpoints need to be saved in a safe and a stable storage to avoid data loss. Due the the specific constraints of...
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed to allow human operators supervise, maintain, and control critical infrastructure. Recent years has seen an increase in connectivity of SCADA systems to the Internet. While this connectivity provides an increased level of...
The protocols underlying large-scale geo-replicated storage systems implement a wide spectrum of transactional consistency criteria. These protocols typically execute in two phases: ● In the Execution phase, a transaction reads from a database snap-shot and buffers its updates. ● In the Termination phase, a multicast/2PC protocol commits updates atomically while performing a so-called certification...
License plate matching plays an important role in applications like law enforcement, traffic management and road pricing, where the plate is first recognized and then compared to a database of authorized vehicle registration plates. Unfortunately, there are several privacy related issues that should be taken care of before deploying plate recognition systems. As a scientific solution to privacy concerns,...
With the development of internet, the network connection between Industrial Control System (ICS) and public internet has been becoming more and more closely. What's more, the traditional IT system attacks have been spread to ICS and become more frequently. However, the traditional security analysis of IT system is not enough to be applied to ICS. In this paper, we present a tool called Attack Path...
Network security management is a big challenge for network administrators due to increasing vulnerabilities. Vulnerabilities are the weakness of the network and allow malicious attackers access to resources controlled by an organization. To keep networks secure network administrators should be aware of all vulnerabilities through which an attacker can gain access. In this paper, we have considered...
This paper is focused on the study of short brain association fibers. We present an automatic method to identify short bundles of the superficial white matter based on inter-subject hierarchical clustering. Our method finds clusters of similar fibers, belonging to the different subjects, according to a distance measure between fibers. First, the algorithm obtains representative bundles and subsequently...
The Human brain connection map is far from being complete. In particular the study of the superficial white matter (SWM) is an unachieved task. Its description is essential for the understanding of human brain function and the study of pathogenesis triggered by abnormal connectivity. In this work we expanded a previously developed method for the automatic creation of a whole brain SWM bundle atlas...
Story-related subject captions (SSCs) are the texts which are added to news videos to summarize the story. Compared to all types of caption texts (channel logo, scene locations, scrolling marquee, time, speaker names, audio subtitles, dates etc.), only SSCs describe the news stories and this is useful in news video analysis and retrieval systems. Different from most existing methods in the literature...
This article describes the results of a study that compares disclosure occurrences of bullying from children (ages 8 to 12) to either a human or a social robot. Results from an orally administered questionnaire to 60 children, split evenly between human and robotic interviewers, revealed that few significant differences in reporting were encountered between interviewer types. Overall 9 of 60 (15%)...
The wide deployment of public cloud computing infrastructures has become an appealing solution for the advantages of flexibility and cost saving, but the risk of being exposed to privacy and security issues refrains a lot of customers from risking their sensitive data to the cloud. The data owners do not want to move to the cloud unless the data confidentiality and the privacy of their queries are...
We live in a world increasingly digital where intelligent and communicating objects evolve and interact. These objects have their own missions and goals. However, in a more and more complex environment, mechanisms of communication and information exchange protocols need to be more efficient, fast and smart. The collaborative approach seems to be the most suitable to facilitate interaction between...
This paper deals with identification of operating systems (OSs) from the Internet traffic. Every packet injected on the network carries a specific information in its packet header that reflects the initial settings of a host's operating system. The set of such features forms a fingerprint. The OS fingerprint usually includes an initial TTL time, a TCP initial window time, a set of specific TCP options,...
Multihoming is among the features of SCTP (Stream Control Transmission Protocol), which makes it more robust and efficient than TCP(Transmission Control Protocol)but more vulnerable under attack. Nevertheless, a strong security can degrade the QoS(Quality of Service) by adding additional delay. Therefore, we propose in this paper, a secure authentication protocol that supports the establishment of...
Payment schemes based on mobile devices are expected to supersede traditional electronic payment approaches in the next few years. However, current solutions are limited in that protocols require at least one of the two parties to be on-line, i.e. connected either to a trusted third party or to a shared database. Indeed, in cases where customer and vendor are persistently or intermittently disconnected...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.