The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Prospective memory can maintain our ability to living independently, which is important for our daily lives. Evaluation of prospective memory can be reflecting the severity of cognitive ability regression. Previous studies developed slide-based task and living-based task to evaluate prospective memory performance in different conditions. However, as a new technology that can provide a more realistic...
In recent years, web services have become an indispensable part of our life. By use of personal computers, smart phones and wearable smart devices, people can enjoy the convenience brought by these web services and use them to not only enrich our daily life but also solve life issues. Thus, to more appropriately realize the performance of a web service, it is necessary to perform an overall and credible...
Vulnerability assessment is the practice of testing a computer system, network or application to identify, measure and rank vulnerabilities within the system. This project's goal is to create a distributed vulnerability assessment architecture utilizing multiple miniaturized computers such as Raspberry Pi 2 Model B. The scheme delegates scanning tasks to low-cost and self-contained miniaturized devices...
Color characteristics of computer monitors and similar display devices can significantly alter the way an image is perceived by the human eye. Modern cameras and software applications are able to create vibrant scenes and retain their original colorfulness through an embedded ICC[1] profile. Gamut differences between input and output mediums require color management techniques in order to preserve...
A monitoring system plays an important role in the different open environments such as school, colleges, universities, offices, etc. An offline monitoring system continuously monitors the network and notify to the network administrator when any suspicious or abnormal activities happen within the network. The computer system has a standard processes along with some credentials which are predefined...
This paper proposes a continuous authentication scheme for use in remote monitored biomedical devices, such as the Implantable Cardioverter Defibrillator or for a Pacemaker. In the age of remote monitoring, all your heart data is readily available on the device and is accessible to the doctor over the internet. However, it is possible that in the logged-in state and with the computer left unattended,...
The long-term and real-time recording and analysis of a patient's heart rate can be helpful for medical staff to estimate a patient's prognosis. The long-term trends of various heart rate variability (HRV) parameters of a patient's condition may indicate disease development. In some cases, it may be used as feedback for providing suitable medical treatment. Because of the long-term purpose of recording...
To reduce the chance of traffic crashes, many driver monitoring systems (DMSs) have been developed. A DMS warns the driver under abnormal driving conditions. However, traditional approaches require enumerating abnormal driving conditions. In this paper, we propose a novel DMS, which models the driver's normal driving statuses based on sparse reconstruction. The proposed DMS compares the driver's statuses...
This paper describes implementation of target detecting and tracking system, which can extract required information from images without need for an external processing unit and track the target, based on embedded system. The requirements of image capturing, target detection, allocate target position, and implementing based on raspberry pi system as embedded system on chip kit. Real time tracking is...
In this study, we verified the effect of tablet terminals and edutab in mathematics for the third graders at elementary school with using two types of questionnaires. "Attitudes towards creativity in mathematics education" and "Self-other recognition test." As a result, it became clear that when Children got a rough concept when looking at the idea displayed on the LCD monitor...
One of the most important machine learning techniques include clustering of data into different clusters or categories. There are several decent algorithms and techniques that exist to perform clustering on small to medium scale data. In the era of Big Data and with applications being large-scale and data-intensive in nature, there is a significant increment in volume, variety and velocity of data...
Wireless sensor network (WSN) is commonly used for localization applications. Through sniffing receive signal strength indicator (RSSI) in WSN system, localization and connection to access point highest RSSI can be done automatically. In this paper, we propose Raspberry-Pi (RasPi), based best access point selection method utilizing RSSI metric. The RasPi brings the advantages of a personal computer...
Peer assessment refers to the students with the similar academic level of learning achievement or knowledge background. During a learning activity of typical peer assessment, in order to have more meaningful peer feedback, students must have sufficient evaluation professional degree. Therefore, it is necessary to train students how to write in a meaningful text and constructive comments. Besides,...
Mechanical parameters are regarded as important content of high voltage vacuum circuit breaker's (HV-VCB) condition monitoring, and the location of closing and separating moment is the premise and key for these parameters' calculation. An on-line monitoring system based on FPGA+ARM+SBC for HV-VCB is designed and developed with various functions. On the basis of which, a new singular point detection...
The research aims at the development of a method of continuous identification of computer network users during their professional activity by means of data received from standard peripherals (keystroke dynamics, facial images registered by a web camera, mouse dynamics). A new method of identification is proposed. A natural experiment evaluating the reliability of the proposed method has been carried...
Long lived attack campaigns known as Advanced Persistent Threats (APTs) have emerged as a serious security risk. These attack campaigns are customised for their target and performed step by step during months on end. The major difficulty in detecting an APT is keeping track of the different steps logged over months of monitoring and linking them. In this article, we describe TerminAPTor, an APT detector...
The demand for Solid-State drives (SSDs) has risen as their speed, size, and architecture have improved. SSDs introduce a security risk because they contain a separate processor to optimize the SSD's lifespan. The lack of transparency of the operations conducted by this onboard processor creates a challenge to users, particularly in digital forensics settings. This paper utilizes non-destructive voltage...
We present a desktop monitoring application that combines keyboard, mouse, desktop and application-level activities. It has been developed to discover differences in cognitive functioning amongst older computer users indicative of mild cognitive impairment (MCI). Following requirements capture from clinical domain experts, the tool collects all Microsoft Windows events deemed potentially useful for...
Water is a highly abundant nutrient in the human body and monitoring of its regulation is essential to keep the body hydrated. A number of critical health conditions including swelling of the brain and short/long term memory loss are associated with poor or excessive drinking habits. This can be prevented with the use of a real time hydration monitoring system. In this paper we presented AutoHydrate,...
Enterprise networks have been a frequent target of data breaches and sabotage. In a widely used method, attackers establish a foothold in the target network by compromising a single computer or account. They then move laterally between computers to access valuable resources and information located deeper inside the network. To move laterally, attackers often steal valid user credentials. This paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.