The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Antenatal care refers to the health care for women in pregnancy period. Periodic and regular supervision to a pregnant woman throughout pregnancy period until labor which will help reducing maternal death rates and miscarriages as well as birth defects, low birth weight, newborn infections and other preventable health problems. e-health plays a vital role to improve and assist independent living of...
Benefits of electronic social environments created with the support of IoT enabled devices can be augmented parallel to the communication power of users in equal levels. Even thougha variety of models and frameworks which describe factors associated with the eHealth literacy and online health information seeking behavior are available, it is very rare to have a framework which elucidates the role...
Shortest Path issue plays an important role in applications of road network such as handling city emergency way and guiding driver system. The concepts of network analysis with traffic issues are recognized. The condition of traffic among a city changes periodically and there are usually large amounts of requests occur, it needs to be solve quickly. By using the Dijkstra's Algorithm, the above problems...
The sensors are used for many applications in the recent time. The sensors generally connect with each other wirelessly to form a Wireless Sensor Network (WSN). Cloud computing is an emerging technology where the end users pay and access the services without worried about the infrastructure. Sensor cloud combines sensor network with the cloud computing in which the end users can access to the sensor...
Detecting epidemic out breaks as early as possible and gathering reports to substantiate the cause and carrying out immediate actions for alerting public and taking action are major targets of a public health epidemic surveillance. Challenges for an epidemiologist lies in reaching out and collecting information from a territory especially in getting informal reports from public rather than gathering...
One of the core model of the Tutor System is considered to be Student model, which pays special attention to student's cognitive and affective states and their evolution as the learning process advances. As the student works step-by-step through their problem solving process the system engages in a process called model tracing. Anytime the student model deviates from the domain model the system identifies,...
Internet of Things (IoT) allows the interconnection of computing and sensing devices over the Internet, allowing them to send and receive data. The applications of IoT range from Smart Home to Wearable devices. An IoT system has high security requirements, owing to the critical and sensitive nature of the information exchanged between devices. In this paper, a schematic consisting of Asymmetric and...
Side channel analysis (SCA) represents frequently occurred and major type of attack against implementation of any cryptographic protocols. SCA has ability to directly attack on small part of the key and aggregate this information over different encryption. We can prevent SCA attack by changing secret key at every run. Leakage resilient cryptography is used to design cryptographic protocol that remains...
Biometric identification has gained a large popularity in recent years. Biometric identification of a person is giving more accurate results comparing to other security methods. In this paper we have proposed a method to recognize a person by the way he walks. This paper mainly focuses on moving subject (human) identification using Gaussian filter, background reduction, joint point plotting and feature...
Traditionally fossil fuels are primary energy resources for generate electricity. Perhaps, it emitting greenhouse gasses which harms the eco system and so it causes climatic changes. Furthermore depletion rate of fossil fuels is increased due to rapid consumption of power plant. Hence, the harness rate of electrical energy from Renewable Energy Sources (RES) is significantly increased. Worldwide accessibility...
Internet of things (IoT) is going to be an integral part of our lives in the next few years. It will be found as direct service provider in our surroundings through the connected sensor based networks. Even indirectly, it will serve us in several forms as value added services over the cellular platforms. However, it is very much vulnerable from several security threats. The current security level...
This research work tries to understand the “interest” of the users of Twitter, where we define the interest as the maximum number of tweets a user has posted on a single topic. The discovery of top interest of for each Twitter user can have a variety of applications at Twitter including user recommendation with same interests and advertiser tagging. It would also result in a rich user experience....
This paper aims at presenting DISS-X, a modified version of DISSense[1] (An adaptive ultra-low power communication protocol for Wireless sensor networks (WSN's)) that uses two Medium Access Control protocols, namely CSMA/CA and XMAC one after the other. It aims at catering the applications related to physical environment monitoring in the Building Management Industry. DISS-X is similar to DISSense...
Internet of Things (IoT) has several applications which directly affect our lives. IoT has been proposed to be part of the connected living paradigm. In this pool of applications, we also have localization based services. In the first one, localization of objects, animals and other living beings are determined using IoT. In the second one, the movement of the animals, kids, elderly and other moveable...
In this paper we propose a segmentation algorithm for noisy Synthetic Aperture Radar (SAR) images. This method is based on k-means (KM) clustering and thresholding techniques. SAR images have huge employment in topography, remote sensing, and subsurface imaging. The segmentation of SAR images is always demanding because of the noise present in it. Speckle noise is the common noise present in SAR images...
Currently, scores of pervasive computing systems have not yet taken trust based on service discovery, due to the scarcity of a suitable sustaining infrastructure. In this paper we propose an adapted Jini service architecture for Pervasive Computing. This architecture processes the service discoveries which also preserve ACID properties. The infrastructure is built on both the Jini service architecture...
Underwater wireless sensor networks are the enabling technology in the underwater communication systems, and it is the fusion of wireless sensor networks. Underwater communication mainly done with a set of nodes for transmitting of data between their nodes and sink node to transfer the sensed data to the nearby base station which may situated in the coastal area for monitoring and control station...
Software security is considered as an important issue in the modern software development practices. According to the literature, the benefits of the existing static analysis tools in isolation for security specific analysis of multiple large-scale software systems is highly questionable. In particular, the existing static analysis tools are not facilitating different analysis directions such as classification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.