Search results for " networking"

showing 10 items of 1264 documents

Evaluation of touchscreen assistive technology for visually disabled users

2017

Touchscreen assistive technology is designed to support speech interaction between visually disabled people and mobile devices, allowing the use of a choreography of gestures to interact with a touch user interface. This paper presents the evaluation of VoiceOver, a screen reader in Apple Inc. products, made in the research project Visually impaired users touching the screen- A user evaluation of assistive technology together with six visually disabled test participants. The aim was to identify challenges related to the performance of the gestures for screen interaction and evaluate the system response to the gestures. The main results showed that most of the hand gestures were easy to perf…

Screen readerMultimediabusiness.industryComputer scienceTouch user interface020206 networking & telecommunicationsUsability02 engineering and technologycomputer.software_genrelaw.inventionVisualizationChoreography03 medical and health sciences0302 clinical medicineTouchscreenlawHuman–computer interaction030221 ophthalmology & optometry0202 electrical engineering electronic engineering information engineeringbusinesscomputerMobile deviceGesture2017 IEEE Symposium on Computers and Communications (ISCC)
researchProduct

Modeling Transit Flow Through Port Gates and Connecting Channel in Baltic Sea—Liepaja Port—Liepaja Lake System

2021

This study investigates a water transport features by extending Copernicus Marine Environment Service (CMEMS) to the Liepaja coast-port-channel-lake system with a two-way nested model. The Liepaja lake and Liepaja port are connected by Trade channel. The Liepaja port has three gates—the openings in wave breakers connecting the port aquatory with the Baltic sea. Each of gates has a corresponding dredged channel for securing the navigation. A hydrodynamic model is set up to study the flow and water level in this system. The area of the port gates, port and Trade channel are resolved by 33 m grid. The model results are verified against currents and sea level observations inside/outside port, T…

Seiche010504 meteorology & atmospheric sciencesScienceOcean EngineeringQH1-199.5Aquatic ScienceOceanography01 natural sciencestransit currents in portsport hydrodynamicsport seichesUnderwatertwo-way nesting0105 earth and related environmental sciencesWater Science and TechnologygeographyGlobal and Planetary ChangeWater transportgeography.geographical_feature_category010505 oceanographyQFetchOcean currentGeneral. Including nature conservation geographical distributionPort (computer networking)Water levelOceanographycoastal modelingGeologyChannel (geography)Frontiers in Marine Science
researchProduct

Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps

2019

Abstract This paper addresses several topics of great interest in computer security in recent years: computer users’ behavior, security incidents and fraud exposure on the Internet, due to their high economic and social cost. Traditional research has been based mainly on gathering information about security incidents and fraud through surveys. The novelty of the present study is given by the use of Self-Organizing Maps (SOMs), a visual data mining technique. SOMs are applied to two data sets acquired using two different methodologies for collecting data about computer security. First, a traditional online survey about fraud exposure, security and user behavior was used. Second, in addition …

Self-organizing mapGeneral Computer Sciencebusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyData scienceKnowledge extraction0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetInformation societybusinessLawComputers & Security
researchProduct

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

Multi-Connectivity Management for 5G V2X Communication

2019

With the advent of automated driving functions the need for cooperation among vehicles becomes increasingly necessary. The availability of high quality connectivity is an important factor for successful and uninterrupted cooperative and autonomous services. Flexible selection of available connectivity options, increases the probabilities to achieve and maintain the required Quality of Service (QoS). Future vehicles will support multiple 5G communication interfaces e.g., cellular (Uu), sidelink (PC5). A 5G RAN-based solution is proposed in this paper to dynamically select and change the communication interface that is suitable for a V2X service, considering radio and road conditions. The com…

Service (business)050210 logistics & transportationbusiness.industryNetwork packetComputer scienceQuality of servicemedia_common.quotation_subject05 social sciences020206 networking & telecommunications02 engineering and technologyFactor (programming language)0502 economics and business0202 electrical engineering electronic engineering information engineeringQuality (business)businesscomputer5GComputer networkmedia_commoncomputer.programming_language2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct

Experimental Performance Evaluation of Cloud-Based Analytics-as-a-Service

2016

An increasing number of Analytics-as-a-Service solutions has recently seen the light, in the landscape of cloud-based services. These services allow flexible composition of compute and storage components, that create powerful data ingestion and processing pipelines. This work is a first attempt at an experimental evaluation of analytic application performance executed using a wide range of storage service configurations. We present an intuitive notion of data locality, that we use as a proxy to rank different service compositions in terms of expected performance. Through an empirical analysis, we dissect the performance achieved by analytic workloads and unveil problems due to the impedance…

Service (business)FOS: Computer and information sciencesDistributed databaseComputer sciencebusiness.industryReliability (computer networking)Distributed computingRank (computer programming)020206 networking & telecommunicationsCloud computing02 engineering and technologyData modelingperformance evaluationstorageComputer Science - Distributed Parallel and Cluster ComputingAnalytics0202 electrical engineering electronic engineering information engineeringDistributed Parallel and Cluster Computing (cs.DC)business
researchProduct

Towards global service level guarantee within autonomic computing systems

2011

International audience; In this paper, we specify a global service level guarantee including not only QoS but also security and taking into account user mobility. This global service level could be guaranteed within several autonomic computing systems managed by different autonomic domain managers. For that purpose, we propose an end-to-end Service Level Negotiation Protocol, called SLNP, to provide those autonomic managers with a negotiation capability. This allows achieving an agreement on the service level of each offered service between the different domains involved in the transport of that service. SLNP Implementation is made of Web Services technologies to enable interoperability in …

Service (business)Process management[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Computer sciencebusiness.industryQuality of service[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]InteroperabilityService level objective020206 networking & telecommunicationsService level requirement02 engineering and technologycomputer.software_genreAutonomic computing[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]020204 information systemsService level0202 electrical engineering electronic engineering information engineeringWeb servicebusinesscomputerComputer network
researchProduct

A framework for IoT service experiment platforms in smart-city environments

2016

Cities provide an excellent platform for gathering and detection of massive amount of data from cities and citizens. Emergence of new digital technologies inspires not only city governments but also city residents, researchers, companies and other stakeholders in discovering and creating new innovative solutions to solve urban challenges and improve peoples´ everyday life. Developing novel Internet of Things (IoT) solutions for cities and citizens requires facilities where IoT applications and services can be tested and experimented. The challenge for many smart-city test and experimentation platforms (TEPs), like living labs, has been the lack of sustainable value creation model. This has …

Service (systems architecture)Computer science02 engineering and technologyComputer securitycomputer.software_genreIoT experimentation platformsSmart city0502 economics and business0202 electrical engineering electronic engineering information engineeringesineiden internetstakeholderEveryday lifeta113test and experimentation platformSustainable Valuebusiness.industryvalue networks05 social sciencesStakeholder020206 networking & telecommunicationsinternet of thingsData scienceValue networksmart-citysustainable value creationInternet of Thingsbusinesscomputer050203 business & management2016 IEEE International Smart Cities Conference (ISC2)
researchProduct

An RF Wireless Power Transfer system to power battery-free devices for asset tracking

2019

Internet of Things (IoT) and Wireless Sensor Networks (WSN) infrastructures are becoming more and more available and diffused. One major outcome is the development of new services that help to make everyday life easier and better. One of those to which this paper reserves special attention is asset tracking which refers to the method of tracking physical assets. This service is very well based on IoT infrastructure and, due to the enormous number of objects to be traced, desperately needs the availability of inexpensive tags with sensing capabilities, that can be conveniently monitored from a long distance and require no maintenance. For this, engineers are called to face very challenging i…

Service (systems architecture)Computer scienceAsset trackingReal-time computingBattery02 engineering and technologyAsset (computer security)01 natural sciencesWireless Battery ChargerEnergy Harvesting0202 electrical engineering electronic engineering information engineeringSystem on a chipWireless power transferwireless sensor networksRadio Frequency010401 analytical chemistry020206 networking & telecommunicationsinternet of things0104 chemical sciencesWSNsIdentification (information)Lithium IonInternet of ThingEnergy harvestingWireless sensor networkWireless Sensor Network
researchProduct