The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The goal of this paper is to describe the motivation, process and results of converting a traditional mobile robotics classroom into a flipped one. Mobile robotics has been taught at this university for 10 years and the course has proven to be very successful. The challenge with this success is that there is only one instructor, one section, once per year with an enrollment cap of 24 students. These...
The growing popularity of Android and the increasing amount of sensitive data stored in mobile devices have lead to the dissemination of Android ransomware. Ransomware is a class of malware that makes data inaccessible by blocking access to the device or, more frequently, by encrypting the data; to recover the data, the user has to pay a ransom to the attacker. A solution for this problem is to backup...
Modern software systems provide many configuration options which significantly influence their non-functional properties. To understand and predict the effect of configuration options, several sampling and learning strategies have been proposed, albeit often with significant cost to cover the highly dimensional configuration space. Recently, transfer learning has been applied to reduce the effort...
In less than a decade, mobile apps became an integral part of our lives. In several situations it is important to provide assurance that a mobile app is authentic, i.e., that it is indeed the app produced by a certain company. However, this is challenging, as such apps can be repackaged, the user malicious, or the app tampered with by an attacker. This paper presents the design of TRUAPP, a software...
This WIP exposes the design and implementation of Midroid, an open mobile platform focused on microcontrollers' education. The platform has been designed with the aim to address both the problems detected as the educational gaps associated to the acquisition of the algorithmic thinking needed in the conceptualization and structuring of a program or algorithm determined. To technical level, the platform...
Mobile Broadband (MBB) Networks are evolving at a fast pace, with technology enhancements that promise drastic improvements in capacity, connectivity, coverage, i.e., better performance in general. But how to measure the actual performance of a MBB solution? In this paper, we present our experience in running the simplest of the performance test: "speedtest-like" measurements to estimate...
As the demand for higher computing resource systems and more distributed services is increasing, changes are required. Cloud computing has thus enabled distributed networks that enable computing resources in an online manner. This has further developed into concepts such as mobile cloud computing systems which provide mobile devices with resources to help minimize computing limitations. Other technologies,...
Driving assistance is becoming an increasingly important matter nowadays, due to the advancements in technology in fields of communication and signal processing. Helping the driver detect and avoid incoming hazards while driving can save lives and decrease road fatalities. For that purpose, this paper describes a hybrid solution based on hardware modules that can be installed on curvy and/or mountainous...
The technology, which is implemented using cross-platform tools, is proposed for modeling of gesture units of sign language, dynamic mapping between states of gesture units with a combination of gestures structures (words, sentences). The technology implemented simulated playback of gesture items and constructions using virtual model of spatial hand. With the cross-platform means technology achieves...
Accurate, real-time Automatic Speech Recognition (ASR) comes at a high energy cost, so accuracy has often to be sacrificed in order to fit the strict power constraints of mobile systems. However, accuracy is extremely important for the end-user, and today's systems are still unsatisfactory for many applications. The most critical component of an ASR system is the acoustic scoring, as it has a large...
Pose estimation systems have seen some big developments in the last two decades due to technological advances and a greater need for these systems. The industry that thrives and simultaneously popularizes these developments is the entertainment industry. One of the latest developments in home entertainment are Virtual Reality systems that lets users have an immersive experience when playing video...
Massive multiple-input multiple-output (MIMO) is an emerging technology for future wireless networks, scaling up conventional MIMO to an unprecedented number of antennas at base stations. Such a large antenna array has the potential to make the system achieve high channel capacity and spectral efficiency, but it also leads to high cost in terms of hardware complexity. In this paper, we consider a...
Quantization is considered as one of the most effective methods to optimize the inference cost of neural network models for their deployment to mobile and embedded systems, which have tight resource constraints. In such approaches, it is critical to provide low-cost quantization under a tight accuracy loss constraint (e.g., 1%). In this paper, we propose a novel method for quantizing weights and activations...
In order to prevent users from fake, this paper establishes a highly secure mobile terminal architecture based on ARM TrustZone, and analyzes the communication and memory sharing between trusted execution environment and common execution environment. The trust model of user operation is established, then propose a self _destruction mechanism of mobile equipment based on chip materials to detect fraudulent...
Recent advances in technology and rapid growth of consumer electronics have made tremendous amount of multimedia information available to the general population. Browsing through large collections of consumer videos and manually creating summaries can be tedious. Automatic summarization techniques will give the user an easy way to look up important content of a collection of media and to browse media...
Caller ID has been used to tell the recipient who is calling before answering the call. In fact, nowadays using just Caller ID is not enough to proof the real caller since there are several ways to manipulate the caller identity. There are number of solutions to proof the caller e.g. using Time base, SMS base, or hardware. Even using DSA and CA, it can lead to data leak or inconsistent verification...
In this work we analyze the complex trade-off between data transfer, computation time, and power consumption when a multi-stage data-intensive algorithm (in this case video stabilization) is split between a low power mobile device and high power cloud server. We evaluate design choices in terms of which intermediate representations should be transferred to the server and back to the mobile device,...
Internet of Things (IoT) is an emergent technology paradigm that has been adopted in many areas such as smart cities, smart health organizations, and smart homes. IoT has facilitated the use of computing services for communities. IoT has provided lots of benefits in different domains. The use of IoT technology can be exorbitant, therefore there is a need to find economical solution to facilitate the...
Computing resources including mobile devices at the edge of a network are increasingly connected and capable of collaboratively processing what's believed to be too complex to them. Collaboration possibilities with today's feature-rich mobile devices go far beyond simple media content sharing, traditional video conferencing and cloud-based software as a services. The realization of these possibilities...
In this paper, we develop a framework for an innovative perceptive mobile (i.e. cellular) network that integrates sensing with communication, and supports new applications widely in transportation, surveillance and environmental sensing. Three types of sensing methods implemented in the base-stations are proposed, using either uplink or downlink multiuser communication signals. The required changes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.