37,602 research outputs found
First experiences with Personal Networks as an enabling platform for service providers
By developing demonstrators and performing small-scale user trials, we found various opportunities and pitfalls for deploying personal networks (PNs) on a commercial basis. The demonstrators were created using as many as possible legacy devices and proven technologies. They deal with applications in the health sector, home services, tourism, and the transportation sector. This paper describes the various architectures and our experiences with the end users and the technology. We conclude that context awareness, service discovery, and content management are very important in PNs and that a personal network provider role is necessary to realize these functions under the assumptions we made. The PNPay Travel demonstrator suggests that PN service platforms provide an opportunity to develop true trans-sector services
High frequency band communication application in Malaysia
High frequency (HF) radio frequencies are between 3 and 30 MHz.[1] Also known as the decameter band or decameter wave as the wavelengths range from one to ten decameters. Shortwave (2.310 - 25.820 MHz)[1] overlaps and is slightly lower than HF. Since the ionosphere often reflects HF radio waves quite well (a phenomenon known as skywave), this range is extensively used for medium and long range terrestrial radio communication. However, suitability of this portion of the spectrum for such communication varies greatly with a complex combination of factors[1]:
âą Sunlight/darkness at site of transmission and reception
âą Transmitter/receiver proximity to terminator
âą Season
âą Sunspot cycle
âą Solar activity
âą Polar aurora
âą Maximum usable frequency
âą Lowest usable high frequency
âą Frequency of operation within the HF rang
Recommended from our members
Robust Adaptive Intra Refresh for Multiview Video
Transmission error propagation in wireless multimedia communication systems has become a recurring
problem. This persistent problem has led to grave consequences on the visual quality of the decoded video.
It is against this backdrop that, we present an adaptive intra refresh (AIR) error-resilient coding tool to
mitigate the effect of transmission error propagation in 3D video communications. This work utilizes
periodic insertion of intra macroblocks in badly error-infected frames temporally as well as related frames
in the multi view video scheme. Our objective is to maximize the transmission efficiency while ensuring the
transmission robustness of the coded bitstream. The selection of periodic macroblocks is based on areas
with high motion above a pre-set threshold. The coding modes of the macroblocks are based on the
distortion expectation due to transmission errors. Extensive simulation results show significant
improvement in both objective and subjective video quality at different intra refresh rates
Services surround you:physical-virtual linkage with contextual bookmarks
Our daily life is pervaded by digital information and devices, not least the common mobile phone. However, a seamless connection between our physical world, such as a movie trailer on a screen in the main rail station and its digital counterparts, such as an online ticket service, remains difficult. In this paper, we present contextual bookmarks that enable users to capture information of interest with a mobile camera phone. Depending on the userâs context, the snapshot is mapped to a digital service such as ordering tickets for a movie theater close by or a link to the upcoming movieâs Web page
Security and Online learning: to protect or prohibit
The rapid development of online learning is opening up many new learning opportunities. Yet, with this increased potential come a myriad of risks. Usable security systems are essential as poor usability in security can result in excluding intended users while allowing sensitive data to be released to unacceptable recipients. This chapter presents findings concerned with usability for two security issues: authentication mechanisms and privacy. Usability issues such as memorability, feedback, guidance, context of use and concepts of information ownership are reviewed within various environments. This chapter also reviews the roots of these usability difficulties in the culture clash between the non-user-oriented perspective of security and the information exchange culture of the education domain. Finally an account is provided of how future systems can be developed which maintain security and yet are still usable
Responsibility and non-repudiation in resource-constrained Internet of Things scenarios
The proliferation and popularity of smart
autonomous systems necessitates the development
of methods and models for ensuring the effective
identification of their owners and controllers. The aim
of this paper is to critically discuss the responsibility of
Things and their impact on human affairs. This starts
with an in-depth analysis of IoT Characteristics such
as Autonomy, Ubiquity and Pervasiveness. We argue
that Things governed by a controller should have an
identifiable relationship between the two parties and
that authentication and non-repudiation are essential
characteristics in all IoT scenarios which require
trustworthy communications. However, resources can
be a problem, for instance, many Things are designed
to perform in low-powered hardware. Hence, we also
propose a protocol to demonstrate how we can achieve the
authenticity of participating Things in a connectionless
and resource-constrained environment
The Evolution of First Person Vision Methods: A Survey
The emergence of new wearable technologies such as action cameras and
smart-glasses has increased the interest of computer vision scientists in the
First Person perspective. Nowadays, this field is attracting attention and
investments of companies aiming to develop commercial devices with First Person
Vision recording capabilities. Due to this interest, an increasing demand of
methods to process these videos, possibly in real-time, is expected. Current
approaches present a particular combinations of different image features and
quantitative methods to accomplish specific objectives like object detection,
activity recognition, user machine interaction and so on. This paper summarizes
the evolution of the state of the art in First Person Vision video analysis
between 1997 and 2014, highlighting, among others, most commonly used features,
methods, challenges and opportunities within the field.Comment: First Person Vision, Egocentric Vision, Wearable Devices, Smart
Glasses, Computer Vision, Video Analytics, Human-machine Interactio
Germany's broadband networks - innovation on hold
The market for information and communication technologies is changing rapidly. Products and applications that used to be completely separate are becoming almost interchangeable. Sweeping change lies ahead in voice and data telephony: the fixed-line telephone network faces new competition from innovative technologies. In this report we concentrate on analysing the economic potential of TV-cable and powerline networks as internet-access media, and discuss the prospects for the communications market. Besides looking into the technological developments, we examine the market relevance of existing ownership and competitive structures.ICT, cable, Germany, Broadband
Faculty Excellence
Each year, the University of New Hampshire selects a small number of its outstanding faculty for special recognition of their achievements in teaching, scholarship and service. Awards for Excellence in Teaching are given in each college and school, and university-wide awards recognize public service, research, teaching and engagement. This booklet details the year\u27s award winners\u27 accomplishments in short profiles with photographs and text
- âŠ