Search results for " networking"
showing 10 items of 1264 documents
Evaluation of touchscreen assistive technology for visually disabled users
2017
Touchscreen assistive technology is designed to support speech interaction between visually disabled people and mobile devices, allowing the use of a choreography of gestures to interact with a touch user interface. This paper presents the evaluation of VoiceOver, a screen reader in Apple Inc. products, made in the research project Visually impaired users touching the screen- A user evaluation of assistive technology together with six visually disabled test participants. The aim was to identify challenges related to the performance of the gestures for screen interaction and evaluate the system response to the gestures. The main results showed that most of the hand gestures were easy to perf…
Modeling Transit Flow Through Port Gates and Connecting Channel in Baltic Sea—Liepaja Port—Liepaja Lake System
2021
This study investigates a water transport features by extending Copernicus Marine Environment Service (CMEMS) to the Liepaja coast-port-channel-lake system with a two-way nested model. The Liepaja lake and Liepaja port are connected by Trade channel. The Liepaja port has three gates—the openings in wave breakers connecting the port aquatory with the Baltic sea. Each of gates has a corresponding dredged channel for securing the navigation. A hydrodynamic model is set up to study the flow and water level in this system. The area of the port gates, port and Trade channel are resolved by 33 m grid. The model results are verified against currents and sea level observations inside/outside port, T…
Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps
2019
Abstract This paper addresses several topics of great interest in computer security in recent years: computer users’ behavior, security incidents and fraud exposure on the Internet, due to their high economic and social cost. Traditional research has been based mainly on gathering information about security incidents and fraud through surveys. The novelty of the present study is given by the use of Self-Organizing Maps (SOMs), a visual data mining technique. SOMs are applied to two data sets acquired using two different methodologies for collecting data about computer security. First, a traditional online survey about fraud exposure, security and user behavior was used. Second, in addition …
PROLISEAN: A New Security Protocol for Programmable Matter
2021
The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…
Multi-Connectivity Management for 5G V2X Communication
2019
With the advent of automated driving functions the need for cooperation among vehicles becomes increasingly necessary. The availability of high quality connectivity is an important factor for successful and uninterrupted cooperative and autonomous services. Flexible selection of available connectivity options, increases the probabilities to achieve and maintain the required Quality of Service (QoS). Future vehicles will support multiple 5G communication interfaces e.g., cellular (Uu), sidelink (PC5). A 5G RAN-based solution is proposed in this paper to dynamically select and change the communication interface that is suitable for a V2X service, considering radio and road conditions. The com…
A privacy enhanced device access protocol for an IoT context
2013
In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.
Experimental Performance Evaluation of Cloud-Based Analytics-as-a-Service
2016
An increasing number of Analytics-as-a-Service solutions has recently seen the light, in the landscape of cloud-based services. These services allow flexible composition of compute and storage components, that create powerful data ingestion and processing pipelines. This work is a first attempt at an experimental evaluation of analytic application performance executed using a wide range of storage service configurations. We present an intuitive notion of data locality, that we use as a proxy to rank different service compositions in terms of expected performance. Through an empirical analysis, we dissect the performance achieved by analytic workloads and unveil problems due to the impedance…
Towards global service level guarantee within autonomic computing systems
2011
International audience; In this paper, we specify a global service level guarantee including not only QoS but also security and taking into account user mobility. This global service level could be guaranteed within several autonomic computing systems managed by different autonomic domain managers. For that purpose, we propose an end-to-end Service Level Negotiation Protocol, called SLNP, to provide those autonomic managers with a negotiation capability. This allows achieving an agreement on the service level of each offered service between the different domains involved in the transport of that service. SLNP Implementation is made of Web Services technologies to enable interoperability in …
A framework for IoT service experiment platforms in smart-city environments
2016
Cities provide an excellent platform for gathering and detection of massive amount of data from cities and citizens. Emergence of new digital technologies inspires not only city governments but also city residents, researchers, companies and other stakeholders in discovering and creating new innovative solutions to solve urban challenges and improve peoples´ everyday life. Developing novel Internet of Things (IoT) solutions for cities and citizens requires facilities where IoT applications and services can be tested and experimented. The challenge for many smart-city test and experimentation platforms (TEPs), like living labs, has been the lack of sustainable value creation model. This has …
An RF Wireless Power Transfer system to power battery-free devices for asset tracking
2019
Internet of Things (IoT) and Wireless Sensor Networks (WSN) infrastructures are becoming more and more available and diffused. One major outcome is the development of new services that help to make everyday life easier and better. One of those to which this paper reserves special attention is asset tracking which refers to the method of tracking physical assets. This service is very well based on IoT infrastructure and, due to the enormous number of objects to be traced, desperately needs the availability of inexpensive tags with sensing capabilities, that can be conveniently monitored from a long distance and require no maintenance. For this, engineers are called to face very challenging i…