CONTINUOUS AND TRANSPARENT USER IDENTITY VERIFICATION FOR SECURE INTERNET SERVICES
Session management in distributed Internet services is traditionally based on username and password, explicit logouts and mechanisms of user session expiration using classic timeouts. Emerging biometric solutions allow substituting username and password with biometric data during session establishment, but in such an approach still a single verification is deemed sufficient, and the identity of a […]
Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization
To implement the system to solve the joint problem of packet scheduling and self-localization in an underwater acoustic sensor network with randomly distributed nodes. In terms of packet scheduling, our goal is to minimize the localization time, and to do so we consider two packet transmission schemes, namely a collision-free scheme (CFS), and a collision-tolerant […]
CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM
We propose a new design for large-scale multimedia content protection systems. Our design leverages cloud infrastructures to provide cost efficiency, rapid deployment, scalability, and elasticity to accommodate varying workloads. The proposed system can be used to protect different multimedia content types, including 2-D videos, 3-D videos, images, audio clips, songs, and music clips. The system […]
BRACER A DISTRIBUTED BROADCAST PROTOCOL IN MULTI-HOP COGNITIVE RADIO AD HOC NETWORKS
Broadcast is an important operation in wireless ad hoc networks where control information is usually propagated as broadcasts for the realization of most networking protocols. In traditional ad hoc networks, since the spectrum availability is uniform, broadcasts are delivered via a common channel which can be heard by all users in a network. However, in […]
A Methodology for Extracting Standing Human Bodies From Single Images
Segmentation of human bodies in images is a challenging task that can facilitate numerous applications, like scene understanding and activity recognition. In order to cope with the highly dimensional pose space, scene complexity, and various human appearances, the majority of existing works require computationally complex training and template matching processes. We propose a bottom-up methodology […]
The Pixel 3a joins the Android Enterprise Recommended lineup
Android Enterprise Recommended continues to shape how organizations choose devices for their teams. According to a recent HMD smartphone purchase survey, 56 percent of IT decision makers have decided to only choose Android Enterprise Recommended devices for their business. Android Enterprise Recommended helps businesses select devices with confidence from a breadth of options, so they […]
The Pixel 3a joins the Android Enterprise Recommended lineup
Android Enterprise Recommended continues to shape how organizations choose devices for their teams. According to a recent HMD smartphone purchase survey, 56 percent of IT decision makers have decided to only choose Android Enterprise Recommended devices for their business. Android Enterprise Recommended helps businesses select devices with confidence from a breadth of options, so they […]
PHP MySQL REST API for Android
PHP REST API backed up with a MySQL database is a very common schematic of an Enterprise mobile application. When the scenario requires data to be stored in a centralized manner, then this architecture should be used. Otherwise, the local database in the mobile can be used for the storage and retrieval of information. […]
PHP MySQL REST API for Android
PHP REST API backed up with a MySQL database is a very common schematic of an Enterprise mobile application. When the scenario requires data to be stored in a centralized manner, then this architecture should be used. Otherwise, the local database in the mobile can be used for the storage and retrieval of information. […]
Migrating from PHP 4 to PHP 5.0.x
What has changed in PHP 5.0.x ¶ PHP 5 and the integrated Zend Engine 2 have greatly improved PHP’s performance and capabilities, but great care has been taken to break as little existing code as possible. So migrating your code from PHP 4 to 5 should be very easy. Most existing PHP 4 code should be […]
Develop using the Android SDK and Android Studio
Android Things lets you experiment with building devices on a trusted platform, without previous knowledge of embedded system design: Access hardware such as displays and cameras natively through the Android framework Connect your apps with Google services Integrate additional peripherals through the Peripheral I/O APIs (GPIO, I2C, SPI, UART, PWM) Use the Android Things Console to push over-the-air […]
Develop using the Android SDK and Android Studio
Android Things lets you experiment with building devices on a trusted platform, without previous knowledge of embedded system design: Access hardware such as displays and cameras natively through the Android framework Connect your apps with Google services Integrate additional peripherals through the Peripheral I/O APIs (GPIO, I2C, SPI, UART, PWM) Use the Android Things Console to push over-the-air […]
Distributed Worker-Job Matching Architecture for Crowdsourcing
Towards a Distributed Worker-Job MatchingArchitecture for Crowdsourcing [pdf-embedder url=”https://wellapets.com/wp-content/uploads/2019/06/Towards-a-Distributed-Worker-Job-Matching.pdf” title=”Towards a Distributed Worker-Job Matching”] Abstract— While the crowdsourcing paradigm facilitates the use of human-enacted resources from large groups of individuals, matching workers with jobs is limited by the need for these potential workers to proactively subscribe to various networks.This subscription phase is part of an […]
Distributed Worker-Job Matching Architecture for Crowdsourcing
Towards a Distributed Worker-Job MatchingArchitecture for Crowdsourcing [pdf-embedder url=”https://wellapets.com/wp-content/uploads/2019/06/Towards-a-Distributed-Worker-Job-Matching.pdf” title=”Towards a Distributed Worker-Job Matching”] Abstract— While the crowdsourcing paradigm facilitates the use of human-enacted resources from large groups of individuals, matching workers with jobs is limited by the need for these potential workers to proactively subscribe to various networks.This subscription phase is part of an […]
Providing Privacy-Aware Incentives in Mobile Sensing Systems
Providing Privacy-Aware Incentives in MobileSensing Systems [pdf-embedder url=”https://wellapets.com/wp-content/uploads/2019/06/Providing-Privacy-Aware-Incentives-in-Mobile.pdf” title=”Providing Privacy-Aware Incentives in Mobile”] Mobile sensing relies on data contributed by users through their mobile device (e.g., smart phone) to obtain useful information about people and their surroundings. However, users may not want to contribute due to lack of incentives and concerns on possible privacy leakage. […]
mHealth Systems for Monitoring Patients with Chronic Diseases
Model for Personalization of mHealth Systems for Monitoring Patients with Chronic Diseases [pdf-embedder url=”https://wellapets.com/wp-content/uploads/2019/06/Model-for-Personalization-of-mHealth-Systems.pdf” title=”Model for Personalization of mHealth Systems”] Abstract— Today chronic diseases are a major health problem worldwide. Treatment for these diseases requires proper monitoring and frequent doctor visits. In recent years several ICT tools have been designed to provide remote patients monitoring, […]
mHealth Systems for Monitoring Patients with Chronic Diseases
Model for Personalization of mHealth Systems for Monitoring Patients with Chronic Diseases [pdf-embedder url=”https://wellapets.com/wp-content/uploads/2019/06/Model-for-Personalization-of-mHealth-Systems.pdf” title=”Model for Personalization of mHealth Systems”] Abstract— Today chronic diseases are a major health problem worldwide. Treatment for these diseases requires proper monitoring and frequent doctor visits. In recent years several ICT tools have been designed to provide remote patients monitoring, […]
Job Recruitment and Job Seeking Processes
Job Recruitment and Job Seeking Processes: How Technology Can Help [pdf-embedder url=”https://wellapets.com/wp-content/uploads/2019/06/Job-Recruitment.pdf” title=”Job Recruitment”] Job seeking and recruiting processes have drastically changed during the past decade. Today’s companies are exploiting online technology (job portals, corporate websites, and so on) to make job advertisements reach an ever-growing audience. However, this advantage can create a higher post-processing […]
Crowdsourcing Mobile app for Curriculum Design
Innovative Crowdsourcing Mobile app for Curriculum Design: specification for a prototype mobile application [pdf-embedder url=”https://wellapets.com/wp-content/uploads/2019/06/Innovative-Crowdsourcing-Mobile-app-for-Curriculum-Design-specification-for-a-prototype.pdf” title=”Innovative Crowdsourcing Mobile app for Curriculum Design specification for a prototype”][pdf-embedder url=”https://wellapets.com/wp-content/uploads/2019/06/A-Review-of-Technical-Approaches-to.pdf” title=”A Review of Technical Approaches to”]
Improving Protection of PHP Source Code using Cryptology Models
PHP is one of the most popular languages for Web development. By January 2013, PHP was being used by a remarkable 244M sites, meaning that 39% of sites in Netcraft’s Web Server Survey were running PHP[1]. One of the really significant problems for PHP developers today is lack of free and high-quality solutions for protecting […]
