The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Continuous determination of position on modern smartphones, in particular permanent utilization of GPS, considerably reduces operating times of batteries. However, incessant exploitation of power for determining the current location is avoidable, e.g., while the device is not being moved. This basic idea of considering the kinetic context of a device for localization enables the development of advanced...
Using a 4 digit passcode as authentication is popular among most smartphone users. However, this type of authentication is highly susceptible to a brute force or shoulder surfing attack. Further, it is not uncommon for close family members or friends to already be aware of this secret passcode. The key limitation of such an approach is that it is solely dependent on ‘what a user knows’. We present...
Smart phones are overwhelmingly considered as one of the most viral technological advancements in handheld and mobile computing. A wide array of companies are directly or indirectly incorporating new smart phone platforms and hence continually enhancing their features to wholly new levels. However, the incorporation on the most basic 'ease of use for all' front is still seriously lagging. Although...
Localization using sensor network has attracted much attention for its comparable low-cost and potential use with monitoring and targeting purposes in real and hostile application scenarios. Currently, there are many available approaches to locate persons/things based of GPS and RFID technologies. However, in some application scenario, e.g., disaster rescue application, such localization devices may...
In this paper we define a robust second order cone programming (SOCP) convex optimization for the improvement of localization and tracking accuracy in mobile sensor networks. We focus on two applications, namely formation control and tracking the nodes on the boundaries, and use the properties which are specific to SOCP in order to adjust and predict the location of nodes for a better localization...
The large number of blind and visually impaired individuals in the society has motivated research groups to search for smart solutions that use vision-based technologies to improve their quality of life. This paper describes an Android-based application for object recognition developed to help the blind understand their environment better. This application is based on extracting local features of...
There are several Optical Character Recognition (OCR) mobile applications on the market running on mobile devices, both android and iOS (iPhone, iPad, iPod) platforms. The limitations of mobile device processor hinder the possible execution of computationally intensive applications that need less time of process. This paper proposes a framework of Optical Character Recognition (OCR) on mobile device...
In this paper, we aim to shed some light on the benefits and challenges brought about by using biometrics for securing mobile payments. Some potential solutions to address the challenges are also proposed and analyzed. Based on our analysis, it is shown that biometric cryptosystems are the suitable choice for providing security protection to biometric templates and enabling a seamless integration...
Traditionally, content-based image retrieval systems (CBIR) are designed to allow users to search for images in large databases which match closely with users' query images. Recent emergence of powerful mobile devices equipped with digital cameras have led to the emergence of several interesting mobile CBIR applications. Due to the limited resources in mobile devices, it is critical that the image...
In this paper we describe a mobile-based hazardous material (hazmat) sign detection and recognition system. Hazmat sign detection is based on visual saliency models. We use saliency maps to denote regions that are likely to contain hazmat signs in complex scenes and then use a convex quadrilateral shape detector to find hazmat sign candidates in these regions. Experimental results show that our proposed...
Physical activities play important role in having better health. However, due to the nature of our jobs, most of us have developed sedentary habits and it is very seldom that we find dedicated time for exercise or other physical activities. Sedentary behavior has been identified as an important factor in preventing good health and there is a need to push adults to carry out physical activities regularly,...
Object recognition technology has been a major issue in mobile environments. However, it is difficult to recognize any object on mobile devices, because mobile devices do not have enough performance on CPU and memory components. Thus, a new fast handling algorithm optimized for mobile devices is required to recognize objects. In this research, we propose new methods to recognize any object, especially...
Cellular Data Network measurement and analysis has long been used to characterize Cellular Data Network usage and user behaviors, but with the rapid growing of all kinds of smart terminals and the varied applications on them, the amount of Cellular Data Network data has been growing exponentially. With respect to this challenge, a new management system for the data storage and query has been emerging...
The Insense VM is a specialised Java virtual machine for running Insense programs on wireless sensor nodes. The VM runs on top of InceOS, a purpose-built operating system. A split VM architecture is used, in which Insense programs are compiled to Java classes, then linked and compacted on a more powerful machine into a form suitable for execution by the VM. Measurements demonstrate that the virtual...
Underwater wireless sensor networks (UWSNs) are the enabling technology for various underwater applications, and the interest in UWSNs is growing. Because underwater environment is usually complex and hostile, and beacons are prone to move offsetting from their origin positions and underwater channel occurs error easily. Hence, the coordinates provided by some beacons for the localization of unknown...
This paper proposes a method to localize a mobile camera by searching corresponding points between the mobile camera image and aerial images yielded by GIS database. A same object differently appears in the two images, because the mobile camera images are taken from the user's viewpoints (i.e., on the ground), and aerial images from much higher viewpoints. To reduce such differences in appearance,...
This paper presents experimental work on Ultra Wideband indoor positioning in presence of different objects using a compact UWB antenna using time of arrival positioning techniques. Obstacles considered are wooden table, laboratory chair and a solid wooden object. Different objects affect the accuracy in positioning depending upon the shape, size, and material of the objects. Results show that the...
There are many new issues in human activity recognition using smart phone with built-in acceleration sensors, such as variations of the location and orientation of smart phone. This paper presents a smart phone position-independent activity recognition model based on frequency domain. First, we analyzed FFT curve of Resultant Acceleration in different mobile positions and different activities. The...
New location-aware smartphones applications making use of positioning information, are recently gaining an increasing diffusion although the same accuracy provided by those classical solutions, based on the well known GPS technology, is progressively reached by adopting new or revised less power-hungry communication technologies. Starting from this general framework and taking into account the novel...
We are currently witnessing the increasing diffusion of new location-aware smartphones applications that make intensive use of positioning information, however, the widespread and pervasive GPS technology is gradually giving way to new or revised less power-hungry communication technologies able to guarantee almost the same accuracy. Within this general context, mainly motivated by the current green...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.