This paper aims at presenting an architectural model proposal for a novel Mobile Payment System, called 4iPay. This work considers the following premises: independence of device, location, carrier and cardholder to me...
详细信息
ISBN:
(纸本)9781467313285
This paper aims at presenting an architectural model proposal for a novel Mobile Payment System, called 4iPay. This work considers the following premises: independence of device, location, carrier and cardholder to meet the needs of executing payment transactions in ubiquitous commerce. Our proposal considers the convergence of concepts of ubiquity, unity, universality and unison to form the proposed model. This article describes the model, implementation, preliminary assessments and requirements for mobile payment in ubiquitous environments. We developed a prototype of 4iPay using Android smart phones. The prototype was evaluated in three different scenarios.
This work proposes a deep learning and GIS based workflow to assess the influence of highway barriers on wildlife collisions. Our work consists of using Convolutional Neural Networks to classify images extracted autom...
详细信息
ISBN:
(数字)9781728163741
ISBN:
(纸本)9781728163758
This work proposes a deep learning and GIS based workflow to assess the influence of highway barriers on wildlife collisions. Our work consists of using Convolutional Neural Networks to classify images extracted automatically from Google Street View to determine the type of barrier, and using geoprocessing tools to estimate parameters as barrier length and location. The method was applied in a real dataset, classifying correctly the barriers in the road-kill points with accuracy of 84.44%. Statistical tests were used to evaluate the influence of each type of barrier on the road-kills.
Computer vision systems allow digital reconstruction of targets by capturing information through remote sensors such as video cameras and scanners. In this context, the objective of this work was to evaluate the capac...
Computer vision systems allow digital reconstruction of targets by capturing information through remote sensors such as video cameras and scanners. In this context, the objective of this work was to evaluate the capacity and quality of three-dimensional reconstruction of static targets using the ZED stereoscopic camera. For this goal, we took images of several environments and objects with different surfaces, textures, lighting, distances and acquisition speeds. The results were compared with high-density and high precision point clouds obtained from the targets using a Leica Viva TS15 total station. The data were processed in the CloudCompare software to calculate the displacement between the models generated by the camera and the total station. Under certain circumstances, this technology is able to reconstruct three-dimensional objects and environments with an error of a few centimeters.
Demand generation is crucial for organizations, supplying sales teams with well-qualified commercial opportunities. Despite the wide variety of existing opportunity qualification methodologies, the subjective nature o...
详细信息
Demand generation is crucial for organizations, supplying sales teams with well-qualified commercial opportunities. Despite the wide variety of existing opportunity qualification methodologies, the subjective nature of experts’ final evaluation remains an obstacle to efficiency and productivity in the business process. This research investigated how Fuzzy Set Theory and Fuzzy Logic could be applied to the BANT methodology for qualifying commercial opportunities, aiming to replace these deliberative evaluations by experts to increase the sales cycle performance. A fuzzy inference system was developed to emulate the assessments of the experts. The analysis of the ratings obtained after processing a sample of commercial opportunities from 2022 and 2023 confirmed the system’s effectiveness in aligning with expert perceptions. While the study indicated room for refinements in the model, the findings underscore the potential to streamline the qualification of opportunities and improve sales cycle performance.
This paper presents a cycle of action research conducted to investigate techniques for visualization and filtering of awareness information in a mobile collaborative game titled Warming Up The Brain. This study aims t...
详细信息
This paper presents a cycle of action research conducted to investigate techniques for visualization and filtering of awareness information in a mobile collaborative game titled Warming Up The Brain. This study aims to identify the awareness information that should be presented to the users as well as how to arrange the awareness information in the mobile devices, considering its small screen size. In order to avoid problems such as information overload and information intrusiveness, the awareness information were filtered based on the group data. The game was used by 30 players, divided in 7 rounds. The usability evaluation show that the awareness information were well absorbed by users.
It is well known that face recognition (FR) systems cannot perform well under uncontrolled conditions, but there are no general and robust approaches with total immunity to all conditions. Hence, we present an adjusta...
详细信息
ISBN:
(纸本)9781728104386
It is well known that face recognition (FR) systems cannot perform well under uncontrolled conditions, but there are no general and robust approaches with total immunity to all conditions. Hence, we present an adjustable FR framework with the aid of the Differential Evolution (DE) optimization algorithm. This approach implements several preprocessing and feature extraction techniques aiming to compensate the illumination variation. The main feature of the present work stands on the use of the DE which is responsible for choosing which strategies to use, as well as tunning the parameters involved. In this case study, we aim to address the illumination compensation problem applying on the well known Yale Extended B face dataset. According to the proposed FR framework, the DE can choose any combination of the following techniques and tune its necessary parameters achieving optimized values: the Gamma Intensity Correction (GIC), the Wavelet-based Illumination Normalization (WBIN), the Gaussian Blur, the Laplacian Edge Detection, the Discrete Wavelet Transform (DWT), the Discrete Cosine Transform (DCT), and the Local Binary Patterns (LBP). Our experimental analysis confirms that the proposed approach is suitable for FR using images under varying conditions. It is proved by the average recognition rate of 99.95% obtained using four different datasets.
The cloud computing model enables users to view computational resources as unlimited and that can be dynamically reserved. In addition, users are charged according to a contracted configuration and effective reservati...
详细信息
ISBN:
(纸本)9781728104386
The cloud computing model enables users to view computational resources as unlimited and that can be dynamically reserved. In addition, users are charged according to a contracted configuration and effective reservation time. Thus, it became possible to dynamically provision Virtual Infrastructures (VIs) composed of virtual machines, containers and virtualized network resources. Due to the flexibility in resource provisioning and configuration, VI is being increasingly adopted for hosting data storage services, development platforms and distributed applications. However, when migrating applications to a cloud, users are faced with a significant amount of providers, brokers and services offered. Above all, cloud computing technologies, although innovative, do not ease the migration of virtualized resources between distinct providers, inducing in vendor lock-in. A wide range of cloud providers, APIs, models and management tools further limit the development of VI migration solutions between providers, characterizing an open challenge. This work proposes a mechanism to perform VI migration among providers, based on an architecture agnostic to source and destination providers, as well as VI-hosted applications. In addition, a prototype based on Docker containers and OpenStack clouds was developed both to validate the proposed mechanism and to serve as a reference implementation.
Vehicle-to-Everything (V2X) communication has an essential role for enhancing safety, effi-ciency, and overall driving experience of autonomous driving. To meet the requirements of autonomous driving, V2X demands high...
Vehicle-to-Everything (V2X) communication has an essential role for enhancing safety, effi-ciency, and overall driving experience of autonomous driving. To meet the requirements of autonomous driving, V2X demands high data-rate connectivity, per-ceived zero-latency, and high reliability. These char-acteristics are inherently linked to future-generation mobile communication technologies, such as Beyond 5G (B5G) also known as 6G. However, current so-lutions for simulating 5G communications lack inte-gration between the user and control planes, making the simulation not reliable since the 5G control plane functionalities are not taken into account. In this sense, this paper proposes a first contribution towards to the platform called Beyond 5G Virtual Environment for Cy-bersecurity Testing in V2X Systems (B5GCyberTestV2X) by integrating the 5G control plane from Open5GS and UERANSIM into the Simu5G simulator. The inclusion of the control plane in 5G urban mobility simulations increases the security and reliability of the V2X commu-nication service. Therefore, in order to show the impact of the 5G control plane, we validate a simulation with a scenario in the presence of a spoofer transmitting false warning information. As shown in our simulation, the 5G control plane does not allow the connection of the spoofer into 5G network, making the cybersecurity tests of 5G-based V2X communication more realistic.
暂无评论