The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online social network applications suffer from people owning bulk of fake accounts. These fake accounts cause several problems such as resource consumption and inaccurate study results. In many cases, the social network operators assign full time employees to detect these fake accounts. Many researchers have proposed methods that help detecting fake accounts in online social networks. This research...
Mobile ERP is the current trend of ERP systems, and it has become the focus of the attention of the most ERP vendors. The proliferation of mobile devices, the advances in mobile computing, and the huge leaps of mobile HCI all together are considered the main factors that supported the realization of the mobile ERP concept. However, literature didn't pay enough attention to this subject in both the...
This paper investigates setup optimization of Spatial Modulation (SM) systems. Specifically, the optimal pair of the number of the transmit antennas and the modulation order, for a given spectral efficiency, that minimizes the error rate at the receiver has been discussed. Interesting results regarding the behavior of bit error rate and symbol error rate versus different transmitter setups under different...
Several studies have highlighted the severe under utilization of licensed spectrum by its incumbent (primary) users. To increase spectrum utilization, studies suggested using a dynamic spectrum access model in both spatial and temporal dimensions. For such a model, the spectrum is continuously monitored and the unused parts of it are allocated to secondary users. This is known as Cognitive Radio Networks...
Indoor navigation systems help people navigate inside large buildings such as shopping malls, university campuses, and hospitals. To make the navigation system more accurate, there must be a clear distinction between any pair of different positions in terms of the combined received signal strengths of all access points in range. This paper proposes a novel Genetic Algorithm technique to improve the...
Mobile device localization and location-based services have become an integral part of our lives, especially after the advent and dramatic widespread use of Smartphones. Hence, people have become very much attached to and dependent on their Smartphone in their daily lives due to the advanced features and technologies equipped within, among which are the Global Positioning System and Wi-Fi. In case...
Covering the face and all body parts, sometimes the only evidence to identify a person is their hand geometry, and not the whole hand-only two fingers (the index and the middle fingers) while showing the victory sign, as seen in many terrorists videos. This paper investigates for the first time a new way to identify persons, particularly (terrorists) from their victory sign. We have created a new...
Road conditions play a critical role in ensuring traffic safety and reducing traffic jams and congestions. Ensuring healthy conditions require constant monitoring to detect and predict potential road deterioration. This work proposes a low-cost solution that takes advantage of sensory capabilities of smartphones. By recording Gyro rotation sensor data, we show that abnormalities can be detected by...
The smartphone applications have taken place of the web browser and became the user's primary internet entrance. One application's popularity can be measured by its downloading times, and it is valuable for commercial advertising. Identifying app installation packages from network traffic is one of the most feasible approaches to collect these data. But asymmetric routing, incomplete capture and so...
The typical approach to designing embedded systems manages the specification and design of the hardware and software separately. HW/SW Co-design is used, in embedded computing, to allow the hardware and the software to be designed and implemented together and make sure that the non-functional properties are met. Behavior-driven development (BDD) is an agile software development approach that spurs...
Current research, in Natural Language Processing, shows more interest in the under-resourced languages, during last years. Amazigh language is the autochthon language of North Africa. However, until 2011 that it became a constitutionally official language in Morocco, after years of persecution. Amazigh language is still considered as one of the under resourced languages. The question is: “how can...
Live virtual machine (VM) migration is defined as a technique that migrates the entire operating system (OS) and its associated applications from one host/physical server to another providing that users should not notice any interruption in their services. Live VM migration plays an important role to facilitate online maintenance, load balancing, and energy management as part of resource management...
A typical robotic system includes a few key components, which are motor, speed reducer, drive, controller, power supply, and mechanical frame, in both robot manipulators and/or mobile robots (wheeled or legged). While all the components are necessary, three individuals are critical and stand out, which are speed reducer, motor, and battery (especially Lithium-ion battery), respectively. The reason...
Wireless Sensor Networks (WSNs) have been popular nowadays as they provide low-cost solutions of a wide-range of real life challenges. WSN consists of a group of infrastructure-less wireless nodes that works together to deliver physical or environmental monitored data from source to sink. In general, WSNs are vulnerable to wireless attacks due to the open nature of the wireless networks. Also, WSNs...
In this paper, an upper bound expression of the outage probability (OP) under interference power constraint is derived for cognitive amplify-and-forward (AF) relay network with best relay selection (BRS) scheme. In the proposed model, the destination moves at high speed, more than 100km/h and the channels that connected with destination are modeled as Nakagami-m fading channels, m < 1 whereas the...
The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.