Filters








6,677 Hits in 3.8 sec

Verification and Validation of Smartphone Sensor Networks [chapter]

Hamilton Turner, Jules White
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
This paper introduces Empower, a simulation environment for smartphone sensor networks that simulates smartphone-specific properties of a sensor network, such as data collection policies, and outputs high-level  ...  This paper introduces a subset of mobile wireless sensor networks, called smartphone sensor networks, where large numbers of smartphone devices cooperate to perform sensing tasks.  ...  A key challenge, however, is that verification and validation of smartphone-powered sensor networks is hard.  ... 
doi:10.1007/978-3-642-30607-5_21 fatcat:4tha3ct7eve3xalv35kou4nqma

Towards providing security for mobile games

Amir Yahyavi, Jeffrey Pang, Bettina Kemme
2013 Proceedings of the eighth ACM international workshop on Mobility in the evolving internet architecture - MobiArch '13  
Substantial increase in the power and networking capabilities of smartphones has led to the emergence of mobile games, and mobile gamers now outnumber "core" gamers.  ...  These games include many genres of gaming with different and new requirements.  ...  Many of these smartphones incorporate several sensors such as a GPS chip, an accelerometer, a digital compass, a proximity sensor, an ambient light sensor, a microphone, and a camera.  ... 
doi:10.1145/2505906.2505912 dblp:conf/mobiarch/YahyaviPK13 fatcat:urhvpdt4hffbfiijplnkdybcly

A novel identification/verification model using smartphone's sensors and user behavior

Ghina Dandachi, Bachar El Hassan, Anas El Husseini
2013 2013 2nd International Conference on Advances in Biomedical Engineering  
This work introduces a new perspective of context-based user authentication: users can be authenticated implicitly using data captured by sensors of the smartphone and user behavior; these data are used  ...  For this reason, smartphone sensors are good candidates for providing an implicit authentication.  ...  METHODS The validation of this model is performed on a set of three users. The data is recorded on 24 hours, than classified and tested by SVM neural network.  ... 
doi:10.1109/icabme.2013.6648891 fatcat:l2qgud3kljaalnib6qhhwuf53i

EmgAuth: Unlocking Smartphones with EMG Signals [article]

Boyu Fan, Xiang Su, Jianwei Niu, Pan Hui
2021 arXiv   pre-print
When training the Siamese network, we design a special data augmentation technique to make the system resilient to the rotation of the armband, which makes EmgAuth free of calibration.  ...  In this paper, we propose EmgAuth, a novel electromyography(EMG)-based smartphone unlocking system based on the Siamese network.  ...  Siamese network was first introduced by Bromley et al. to solve the problem of signature verification.  ... 
arXiv:2103.12542v1 fatcat:bwrkiq4qfbfxxafmhlogg6hdsi

Concept proposal and experimental verification of a sidewalk supporting system utilizing a smartphone

Shin-yo Muto, Yukihiro Nakamura, Hideaki Iwamoto, Tatsuaki Ito, Manabu Okamoto
2016 ROBOMECH Journal  
sensors and the characteristics of smartphones.  ...  ., through sidewalk users' smartphones, sensors, and other such devices to provide valid information.  ...  of sensors and the characteristics of smartphones.  ... 
doi:10.1186/s40648-016-0044-4 fatcat:lr2jiqvhu5ecpojgvpqc5grzty

Public Domain Treaty Compliance Verification in the Digital Age

Christopher W. Stubbs, Sidney D. Drell
2013 IEEE technology & society magazine  
There are some data validation and verification challenges that are specific to the PTM concept.  ...  digital communication network, be it through mobile devices such as a smartphone or laptop, or through a desktop computer, or as a stand-alone sensor with a separate special-purpose satellite or network  ... 
doi:10.1109/mts.2013.2286432 fatcat:eqn5uhpmm5ffzcvb5k4dilegt4

An architecture and protocol for smart continuous eHealth monitoring using 5G

Jaime Lloret, Lorena Parra, Miran Taha, Jesus Tomás
2017 Computer Networks  
Our results point out that in order to have high number of patients continuously monitored, it is necessary to use 5G network because it offers low delays and guarantees the availability of bandwidth for  ...  The architecture elements include wearable devices, to take measures from the body, and a smartphone in the patient side and a DataBase with an intelligent system which is able to send an alarm when it  ...  The elements of the architecture include wearable sensors and smartphones that sense the vital signs of the patient and transmit these data over the 5G network to a DataBase station where an intelligent  ... 
doi:10.1016/j.comnet.2017.05.018 fatcat:kbimzh5gjzetpgwvn4ooysr4oy

Crowd‐sourced observations for short‐range numerical weather prediction: Report from EWGLAM / SRNWP Meeting 2019

Kasper S. Hintz, Conor McNicholas, Roger Randriamampianina, Hywel T. P. Williams, Bruce Macpherson, Marion Mittermaier, Jeanette Onvlee‐Hooimeijer, Balázs Szintai
2021 Atmospheric Science Letters  
Two main application areas of CSO are described: data assimilation and verification.  ...  One part of data assimilation developments concentrates on smartphone pressure observations, which represent a large volume of data.  ...  Access to the IBM smartphone pressure dataset was made possible by Peter Neiley, of The Weather Company.  ... 
doi:10.1002/asl.1031 fatcat:glztlwy7nndxppcqarsofda67u

Timestamp integrity in wearable healthcare devices

Muhammad Siddiqi, Vijay Sivaraman, Sanjay Jha
2016 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)  
Lastly, we evaluate our solution via simulation and experimentation across multiple network access technologies.  ...  Wearable sensors for heart-rate, ECG, blood pressure, and blood glucose are gaining increasing prominence in home-based healthcare.  ...  to validate time of the sensor the smartphone's IP address is notified to the Time Inspector, so that the timestamp verification process may commence.  ... 
doi:10.1109/ants.2016.7947783 dblp:conf/IEEEants/SiddiqiSJ16 fatcat:vhehd7drxve53ct3hj6hmrlkle

Investigation of the Optimal Method for Generating and Verifying the Smartphone's Fingerprint: A Review

Shikah J. Alsunaidi, Abdullah M. Almuhaideb
2020 Journal of King Saud University: Computer and Information Sciences  
Smartphones are one of the best options for everyone because of their small size and ease of transport, in addition to their high capabilities equivalent to a personal computer.  ...  Also, it classifies the methods into four categories based on the used technique, namely PUF, machine learning, comparison approach, and sensor calibration.  ...  Acknowledgment We would like to thank the journal editor, associate editor, and the four anonymous reviewers for their very constructive comments.  ... 
doi:10.1016/j.jksuci.2020.06.007 fatcat:d5pp4qcfpzhy7mkpcqvv7tzkky

Smartphone based user verification leveraging gait recognition for mobile healthcare systems

Yanzhi Ren, Yingying Chen, Mooi Choo Chuah, Jie Yang
2013 2013 IEEE International Conference on Sensing, Communications and Networking (SECON)  
This leads to a growing trend of mobile healthcare systems utilizing sensing data collected from smartphones with/without additional external sensors to analyze and understand people's physical and mental  ...  This strongly indicates the feasibility of using smartphone based low grade accelerometer to conduct gait recognition and facilitate effective user verification without active user cooperation.  ...  Acknowledgement: This work is supported in part by National Science Foundation Grants CNS1016303, CNS1217387, CCF1018270, CNS1016296 and CNS1217379.  ... 
doi:10.1109/sahcn.2013.6644973 dblp:conf/secon/RenCC013 fatcat:abzq3qsizvgmfi6jpq2g4khpma

A Human Gait Recognition Against Information Theft in Smartphone using Residual Convolutional Neural Network

Gogineni Krishna Chaitanya, Krovi.Raja Sekhar
2020 International Journal of Advanced Computer Science and Applications  
The physiological qualities include iris acknowledgment, impression of finger, palm and face geometry are used in the biometric validation frameworks.  ...  The genuine user of the smartphone is identified and information theft is prevented by continuous authentication, which is one of the most emerging features in biometrics application.  ...  Data Collection The behaviour activity of user is collected by using tiny sensors in the smartphones, where the gyroscope sensors as G and accelerometer sensors as of the smart phone are selected for collecting  ... 
doi:10.14569/ijacsa.2020.0110544 fatcat:fvdq5c2z7rb73nmeub43w6klgm

Support System for Improvisational Ensemble Based on Long Short-Term Memory Using Smartphone Sensor

Haruya Takase, Shun Shiramatsu
2020 Proceedings of the International Conference on New Interfaces for Musical Expression  
Our system consists of three modules: a module for specifying attack timing using smartphone sensors, module for estimating the vertical movement of the smartphone using smartphone sensors, and module  ...  As a result, the attack timing estimation had zero misjudgments, and the mean error time of the estimated attack timing was smaller than the sensor-acquisition interval.  ...  of the smartphone sensor.  ... 
doi:10.5281/zenodo.4813434 fatcat:wqoknrqvgzdoliz2jaoze6jcja

A Holistic Tool for Developing a Wireless Home-Based Health Monitoring System

Priyanka Bagade, Ayan Banerjee, Sunit Verma, Joseph Milazzo, Sandeep K.S. Gupta
2013 Biomedical Instrumentation & Technology  
Acknowledgment This research is funded by in part by NSF grant CNS-0831544 and IIS-1116385.  ...  Wireless and Security Software updates to LM and sensors: On-the-fly reprogramming of sensors is an active area of research and is currently achievable for very limited types of sensors.  ...  Copying, networking, and distribution prohibited.  ... 
doi:10.2345/0899-8205-47.s1.64 pmid:23600429 fatcat:muumzzw22vbo7lpth475ugfj7e

MICROSERVICE BASED SYSTEM FOR PAPER DOCUMENTS COUNTERFEIT DETECTION

Serghei Oleinic, Victor Beșliu, Tatiana Scorohodova
2020 Zenodo  
The article represents a novel method of paper document validation using modern smartphones.  ...  The method allows regular owner of a smartphone to quickly validate the paper document without having any knowledge about the validation process itself.  ...  The work was approved at the International Conference on Electronics, Communications and Computing, ECCO -2019.  ... 
doi:10.5281/zenodo.3949688 fatcat:pd6s24wt5rfqfd4zvtfx4e7ll4
« Previous Showing results 1 — 15 out of 6,677 results