15 research outputs found

    Towards Racing Gamification with Natural Interface for post stroke Rehabilitation

    Get PDF
    Stroke patient basically suffer from limited movement, they cannot control their balance very well, therefore the therapy that involve repetitive motion, harmonization and stability workout should be applied to them. The invention of Kinect has lead people to applied this device as a tool for recovering patient from stroke because its capability on tracking the skeletal of human body. Racing Game is very popular among the adults, elderly and even kids, the rule it’s quite simple and understandable. The combination between the racing game and natural interface will lead to innovative application which is potential to be used as home therapy for post stroke patient. User will be required to move some parts of their body such as both hand, arm, head and even shoulder. The body tracking is provided by depth camera that can capture and interpret human body gesture recognition to be used as interaction command. The human skeleton will be displayed onto screen to control the car in the game and the result of racing will be synchronized with user excitement which is recorded through Kinect video

    A Quantum Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario

    Get PDF
    Millions of devices are going to participate in 5G producing a huge space for security threats. The 5G specification goals require rigid and robust security protocol against such threats. Quantum cryptography is a recently emerged term in which we test the robustness of security protocols against Quantum computers. Therefore, in this paper, we propose a security protocol called Quantum Key GRID for Authentication and Key Agreement (QKG-AKA) scheme for the dynamic security association. This scheme is efficiently deployed in Long Term Evolution (LTE) architecture without any significant modifications in the underlying base system. The proposed QKGAKA mechanism is analyzed for robustness and proven safe against quantum computers. The simulation results and performance analysis show drastic improvement regarding security and key management over existing schemes

    OGMAD: Optimal GTS-Allocation Mechanism for Adaptive Data Requirements in IEEE 802.15.4 Based Internet of Things

    Get PDF
    Future Internet of Things (IoT) will utilize IEEE 802.15.4 based low data rate communication for various applications. In the IEEE 802.15.4 standard, nodes send data to their Personal Area Network (PAN) coordinator using the Guaranteed Time Slot (GTS). The standard does not meet the adaptive data requirements of GTS requesting nodes in an efficient manner. If requesting GTSs in an active period are more or less than the available limit, either the requested nodes will not be entertained or GTSs remain underutilized. Consequently, it may cause unnecessary delay or poor GTS utilization. In this paper, an Optimal GTS allocation Mechanism for Adaptive Duty cycle (OGMAD) is proposed that adapts the active period of the superframe in accordance with the requested data. OGMAD also reduces GTS size to improve link utilization as well as accommodate more GTS requesting nodes. Simulation results verify that OGMAD improves link utilization, reduces network delay and offers more nodes to transmit their data as compared to the standard

    Performing Subjectivity Classification in Text Using Support Vector Machine

    No full text
    In this paper, I address the problem of the subjectivity classification in text. The subjective text is opinion bearing, whereas the objective text is text without expressing opinions. The supervised learning technique namely, Support Vector Machine (SVM) is used to classify the text as subjective and objective. A publically available dataset of drug reviews is used to conduct the experiments using WEKA platform. The experimental results show that the proposed SVM classifier performed better than the other classifier

    Ontology-based context-aware messaging systems: concept, methodology and applications

    No full text
    Submission note: A thesis submitted in total fulfilment of the requirements for the degree of Doctor of Philosophy to the School of Engineering and Mathematical Science, Faculty of Science, Technology and Education, La Trobe University, Bundoora

    A Survey of Context-Aware Messaging-Addressing for Sustainable Internet of Things (IoT)

    No full text
    Nowadays, communication engineering technology is merging with the Internet of Things (IoT), which consists of numerous connected devices (referred to as things) around the world. Many researchers have shown significant growth of sensor deployments for multiple smart engineering technologies, such as smart-healthcare, smart-industries, smart-cities, and smart-transportation, etc. In such intelligent engineering technologies, sensors continuously generate a bunch of messages in the network. To enhance the value of the data in the messages, we must know the actuality of the data embedded inside the messages. For this purpose, the contextual information of the data creates a vital challenge. Recently, context-aware computing has emerged to be fruitful in dealing with sensor information. In the ubiquitous computing domain, location is commonly considered one of the most essential sources of context. However, whenever users or applications are concerned with objects, and their site or spatial relationships, location models or spatial models are necessary to form a model of the environment. This paper investigates the area of context-aware messaging and addressing services in diverse IoT applications. The paper examines the notion of context and the use of context within the data exchanged by the sensors in an IoT application for messaging and addressing purposes. Based on the importance and need for context of the information, we identify three critical categories of new IoT applications for context-aware messaging and addressing services: emergency applications, applications for guiding and reminding, and social networking applications. For this purpose, a representative range of systems is reviewed according to the application type, the technology being used, their architecture, the context information, and the services they provide. This survey assists the work of defining an approach for context-aware messaging services domain by discovering the area of context-aware messaging

    Minimizing Denial of Service Attack for Multiple Base Stations in Wireless Sensor Network

    No full text
    Wireless sensor network  (WSN) is a network communication technology that is  characterized by its small size; low power consumption and limited memory capacity. It provides communication in a broadcast manner.  These sensor nodes have no specific infrastructure and they are placed randomly throughout the network.  The use of WSNs is to collect data from physical environment and in real time. Error in the collected data or malfunctioning of the sensors can create problems on large scale. There are few ways and methods through which WSNs can be attacked. One of them is the Denial of Service Attack (DoS), which captures the nodes and takes its important data, modifies it or halt it from responding to a bona fide user. Various techniques are used to tackle DoS attack on WSNS. By using the multiple base station approach we can reduce and minimize the drastic effect of DoS attack on WSNs and makes our network secure and functioning in its normal condition
    corecore