Results (367)
Search Parameters:
Keyword: EnvironmentIndoor monitoring in Public Buildings: workplace wellbeing and energy consumptions. An example of IoT for smart cities application
In the recent years LepidaSpa created Sensornet platform for the control of the Emilia-Romagna territory managing heterogeneous environmental sensor networks distributed all over the region. LepidaSpa decided to integrate into Sensornet a brand-new family of sensors measuring indoor environmental parameters inside public buildings, in order to monitor energy consumption on one hand and workers’ wellbeing…
Read MoreDesigning a Smart Car Parking System (PoC) Prototype Utilizing CCTV Nodes: A vision of an IoT parking system via UCD process
Using smart parking systems has become very important, and particularly so for metropolitan areas, because of the benefits for drivers in many aspects, such as time, frustration, stress, and anger, in addition to the increased consumption of fuel while searching for a vacant parking space. This paper proposes a review of recent advances in sensing…
Read MoreDevelopment of an automated vehicle stop system for cardiac emergencies
This paper describes the concept and configuration of a novel automated safety vehicle stop system, and a future prospect of the study. Intrinsic sudden death may cause traffic accident since such accidents sometimes involve not only the driver but also other traffic users such as passengers and pedestrians. Cardiovascular disease (CVD) is considered as a…
Read MoreHuman Robot Interaction for Hybrid Collision Avoidance System for Indoor Mobile Robots
In this paper, a novel approach for collision avoidance for indoor mobile robots based on human-robot interaction is realized. The main contribution of this work is a new technique for collision avoidance by engaging the human and the robot in generating new collision-free paths. In mobile robotics, collision avoidance is critical for the success of…
Read MoreSemantic-less Breach Detection of Polymorphic Malware in Federated Cloud
Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…
Read MoreA delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances
In this paper, a delay-dependent controller based on the sliding mode concept is proposed to stabilize a networked robotic system in a decentralized synchronization scheme. In addition to being affected by communication time-delays between agents, and seen that external disturbances obviously affect any physical and dynamic system, an unsettling action resulting from measurement errors affects…
Read MoreIntrusion detection in cloud computing based attack patterns and risk assessment
This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…
Read MoreMoving Towards Reliability-Centred Management of Energy, Power and Transportation Assets
Infrastructure Asset Management was first adopted in 1980s for challenges faced by the utilities, road and rail transport systems, mining, process and manufacturing industries in asset life cycle value optimization. International standards ISO 55000 and PAS 55 were subsequently developed to provide a basis for a structured methodology in the development of Asset Management System.…
Read MoreToward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is…
Read MoreKinect-Based Moving Human Tracking System with Obstacle Avoidance
This paper is an extension of work originally presented and published in IEEE International Multidisciplinary Conference on Engineering Technology (IMCET). This work presents a design and implementation of a moving human tracking system with obstacle avoidance. The system scans the environment by using Kinect, a 3D sensor, and tracks the center of mass of a…
Read MoreGPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs
Vehicular ad-hoc networks (VANETs) are still more challenging to overcome even if they have been widely studied during the last decades. The routing mechanism is the essentially relevant issue in this field. Indeed, it must strictly to be adapted to specific and unique characteristics such as the high mobility of the vehicles, the dynamic nature…
Read MoreZero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching
Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers. Traditional data center security best practices involving network segmentation are not well suited to these new environments. We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…
Read MoreSpatial Sampling Requirements for Received Signal Level Measurements in Cellular Networks of Suburban Area
A process for the determination of a required spatial resolution in the collection of the Received Signal Level (RSL) is discussed. This method considers RSL measurements as a three dimensional surface that is sampled through the data collection process. In addition, it is difficult to collect RSL measurements for an entire coverage area because of…
Read MoreReal Time Implementation of an Improved Hybrid Fuzzy Sliding Mode Observer Estimator
This paper extends some of our research results disseminated in the most recent awarded international conference paper concerning the implementation in real time of a sliding mode observer state estimator. For the same case study developed in the conference paper, more precisely a DC servomotor angular speed control system, we extend the proposed concept of…
Read MorePrivacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor
Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…
Read MoreA Novel Approach for Designing Mobile Native Apps
Mobile devices are differed from desktop based systems in terms of particular execution environment, constrained resources, and high mobility requirement. To overcome these shortcomings, various agile based methodologies are developed for native mobile applications such as Mobile-D, Scrum etc. These agile techniques are based on various phases and these phases begin from exploring, initializing and…
Read MoreStrong Authentication Protocol based on Java Crypto Chip as a Secure Element
Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…
Read More
