The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To reduce the amount of CO2 produced from the personal cars in the world, the parking lot guidance systems are considered to be the solution in shopping malls or department stores in many countries. However, most of the current parking lot systems are located in the parking area of each shopping mall and they cannot show the parking lots information for the driver that are driving on the road. So,...
This paper provides an overview of the Speaker Anti-spoofing Competition organized by Biometric group at Idiap Research Institute for the IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2016). The competition used AVspoof database, which contains a comprehensive set of presentation attacks, including, (i) direct replay attacks when a genuine data is played back...
As more and more biometric data is stored on ePassports, a reliable method is needed to make sure that only authorized entities have access to the information. In the current border crossing procedure, ePassports verify the access rights of the inspection system requesting access to biometric data stored on the chip of the passport. As passports are constrained devices with limited communication and...
He Near Field Communication (NFC) technology is very comfortable for the user as communication starts without any further configuration. This property makes the standard well suitable for the use with mobile coupons (mCoupons). The application of mCcoupons is quite a novel issue but is becoming increasingly popular among E-commerce because the extensive use of mCoupons can help consumers to save money...
Rapid adoption of smartphones and tablets in recent years has changed the way people communicate with each other and operate in the work environment. The use of personal devices in the enterprise has become commonplace. These devices have given workers the flexibility of being mobile and still participate in collaboration sessions. However, transferring sessions between devices is not very seamless...
These days, instructors in universities and colleges take the attendance manually either by calling out individual's name or by passing around an attendance sheet for student's signature to confirm his/her presence. Using these methods is both cumbersome and time-consuming. Therefore a method of taking attendance using instructor's mobile telephone has been presented in this paper which is paperless,...
Mobile devices manage limited resources, above all data storage capacity and data transfer rate. Data amount used by nowadays applications is beyond the capability of mobile devices. A distributed file system presents an appropriate solution, but current distributed file systems are not suitable for mobile devices. We have explored the properties of current distributed file systems in relation to...
Touch screen-enabled devices are proliferating in the communications and entertainment markets. In this scenario, the use of graphical passwords for user validation is receiving an increasing interest in the last years. Unlike in other fields of research on automatic user authentication, such as biometrics, there are no public databases of graphical passwords usable for research purposes (to the extent...
Due to an increasing number of public and private access points in indoor and urban environments, Wi-Fi positioning becomes more and more attractive for pedestrian navigation. In the last ten years different approaches and solutions have been developed. But Wi-Fi hardware and network protocols have not been designed for positioning. Therefore, Wi-Fi devices have different hardware characteristics...
In this paper, a composite model of apparel marketing contained realitic apparel stores and virtual apparel stores is put forward. In the end, some proposals are given to government, garment industry association and manufacturer.
In this paper we describe an automatic system for car parks payment based on Near Field Communication technology. This system has been projected and developed as part of the SIESTA project, a research project financed by the Tuscany region in Italy, to study innovative services for tourists visiting cities of art. The developed system allows users to use their own mobile phone both as an electronic...
The mobile RFID system is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable services to user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. Contrast to the traditional RFID system, the communication channel between the database and the RFID reader is not assumed to be safe in...
This paper presents the development of FTMK online collaboration system via wireless LAN (AFOS) prototype. The system will allow the UTeM FTMK's lecturers to communicate through the conference system. There are two modules included in the system which are video and audio configuration module and private chat module. AFOS will allow the users in two or more locations to interact via two way video and...
In this paper, we propose a common friend discovery algorithm considering the privacy of users and the authenticity of friend relationships. The privacy means userspsila other friendspsila information does not be leaked except their common friends. The authenticity signifies anyone can not successfully claim he is a friend of someone unless he really is. It has many applications such as playing games...
Identity authentication is the first line of defense in the security application system to access the mobile network resources. However, as the means of attacking become variety, new requirements have been brought forward for the technology of identity authentication. To improve performance of mobile authentication, this paper presents a novel mobile authentication scheme, which transmits message...
Improve the dynamic interaction between embedded device and mobile phone is an important issue in WAP domain. To address this problem, we make cgi, WMLscript and embedded database collaboratively running to fulfill the requirements of mobile phone. On embedded device, cgi receive the parameters submitted by mobile phone and query the database, it appends the results to the end of wml page and send...
Cell phones are no longer merely used to make phone calls or to send short or multimedia messages. They more and more become information systems clients. Recent developments in the areas of mobile computing, wireless networks and information systems provide access to data at almost every place and anytime by using this kind of lightweight mobile device. But even though mobile clients support the Java...
Due to the display area and resource restrictions of small mobile devices, currently, most reported database query systems developed for them are only offering a small set of pre-determined queries that can be posed by users. This not only limits the usage of such systems in their own domain of application, it also prevents them from being used to query other databases. Thus, the abilities to support...
Communication technology has been developing at a rapid speed, and mobile phone usage is now popular. At the same time, mobile phones are considered not only as a simple communication device, but also as a device with extra functionality. In fact, mobile phones are now developing into a digital information terminal. A typhoon forecast negotiation system is a special kind of group decision support...
Almost everyone today has his or her mobile phone and Bluetooth has already become a standard inclusion on most mobile phones, laptops and PDAs. Data transfer through Bluetooth among the handheld devices is common and popular. Bluetooth establishes links in a more convenient manner to facilitate sharing data between devices. It motivates us to apply this technology to hypermarket advertising. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.