The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, Banking is a essential of human life. Customer's informationis stored by the bank. This information is private and saving securely in the database. Customer can process transactions tasks both online and offline manner. Bank transactional activities the attacker easy to hack the details. In this situation we have to protect the bank account. At the point when user input their passwords in...
Nowadays Mobile Ad Hoc Networks has become a popular research subject due to its characteristics. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices. With this problem there are many chances that the intruders may attack the nodes over the function. Using Intrusion Detection Techniques we can find the intruders before it may attack the nodes. Intrusion Detection...
Wireless Sensor Network (WSN) having a small sensor suffers from limited computational and communication power. These sensors are deployed randomly and sparsely in the network. One of the major problems occurring in such environment at the time of deployment is the formation of holes in the network. The hole is a communication gap, which affects the general performance of the network. An improved...
A modern development in time and technology requires faster information broadcasting. United, personalized, intelligent information applications are more significant in business and private lives. Such appliances are cell phones, two-way pagers, personal organizers, screen phones, etc. An ACC (Android College Campus) is an application to access the organization and particularly by students well over...
This paper presents the implementation of Modified DCF (MDCF) protocol for wireless LANs. Under heavy load condition in wireless LAN, the contention based DCF leads to more collision. In this paper, a novelty medium access control protocol called Modified Distribution Coordination Function (MDCF) is proposed to enhance the DCF-based MAC protocol. To avoid the transmission without contention at the...
In recent years, as higher performance terminal equipments are spread, the amount of mobile data traffic is growing rapidly by using popularization of streaming services in wireless networks. To overcome this situation, it is considered that Access Points (APs) are deployed densely for capacity improvement. In such an environment, virtualization is a possible technique to use multiple APs efficiently...
We analyze the design space for implementing the Constrained Application Protocol (CoAP) within Content-Centric Networks (CCN), identifying several CoAP specific scenarios and seeing how they map to CCNs. We present an evaluation, recommendations for implementations and extensions, and directions for future work. Our key result is that while several protocol features and flows map naturally, some...
Mobile Crowdsensing is a promising paradigm for ubiquitous sensing, which explores the tremendous data collected by mobile smart devices with prominent spatial-temporal coverage. As a fundamental property of Mobile Crowdsensing Systems, temporally recruited mobile users can provide agile, fine-grained, and economical sensing labors, however their self-interest cannot guarantee the quality of the sensing...
The consideration of mobile web page and service access for optimization schemes requires a detailed interpretation that goes beyond the commonplace evaluations of HTTP-delivered objects. Evaluating mobile browser interactions with popular web sites, we note that a non-negligible amount of data is delivered with HTTPS and web site interactions could almost exclusively rely on HTTPS delivery of their...
Opportunistic Mobile Social Networks (MSNs) are a type of delay-tolerant networks that are composed of mobile nodes with social characteristics. Most of current research on forwarding algorithms for MSNs leverages the properties of social networks, such as community and centrality. However, the fundamental property, interaction, has not received sufficient attention. The effects of interactions consist...
With recent widespread usage of state-of-the-art technology (e.g., various mobile devices), environmental sensing is getting popular. The sensors used for sensing are small and due to the mobility they become more error-prone, which results in data corruption or loss from sensor. Therefore, cleaning of the sensed data is of high importance to recover the lost or corrupted data. In this paper, we propose...
The demonstration employs mainstream apps and settings on mobile devices to teach photography to participants who are blind, visually impaired and sighted. The demonstration uses principles of universal design for learning. Participants bring their own devices: iOS and Android.
The rapid increase of Internet of Things (IoT) devices will have a significant impact on people's daily life, providing a wide range of services, such as smart lights, door locks, and cameras remotely controlled by smartphones. Remote access within the same environment or via the Internet requires effective authentication and authorization mechanisms beyond those provided by static authentication...
To mitigate performance anomalies due to different transmission rates and improve throughput performance in ad-hoc networks, we propose a method called user cooperative mobility in which a node, i.e., a user of an ad-hoc network, moves (changes its geometrical position) for communication. Unlike previous research regarding user cooperative mobility, it is not easy to decide to where the user should...
Lack of network availability or limited access to communication services are among the challenges that public safety officials and first responders could face during disasters. Networking infrastructure can partially (or sometimes fully) breakdown during a catastrophe. At the same time, unusual peaks in traffic load could lead to much higher blocking probability for critical communication. A possible...
The exponentially increasing demand for higher data rates has pushed the mobile network operators and researchers to scout for ways to improve the system bandwidth, most notably by using the unlicensed band which already hosts long-standing technologies like Wi-Fi. Of late, some effort has gone into exploring the performance of Licensed-Assisted Access (LAA) which can boost the bandwidth of LTE by...
Mobile phones are widely used in our day-to-day life. It's not only used by a common man but also used by antisocial elements and that's why it's not a surprise that today in almost every case the first step towards solving a Crime is to analyze the Call Records of the Suspects. Today in almost all the criminal cases, analysis of Mobile Phone calls of suspect's plays an important role in investigation...
This paper proposes a multi-lingual enhanced Rapid Serial Visual Presentation (RSVP) system named “MulLinR,” which is an attempt for language-specific problems of existing RSVP tools. We design and build a prototype system, which currently only supports Japanese, and experiment with variation of presentation time intervals. Experimental results suggests 400 milliseconds is the most suitable time interval...
With the continuous improvement of 4G communication technologies and the popularity of smart mobile devices, the mobile Internet quickly involves into the people's life and work, and more and more users are accustomed to using mobile phones, tablet PCs and other mobile devices for shopping and consumption. But these goods purchased online will result in the problem of idle items at home. Therefore,...
A cross-platform mobile client remote services invocation mechanism is proposed in this paper based on remote process call (RPC) aiming to solve the difficulties of communication between different mobile clients, such as the complexity of invoking process, code duplication, and maintenance. The proposed method tackles the problem of repeated coding caused by different languages and APIs used in different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.