In this paper, a new paradigm of user authentication called “wireless key” is described. Following this concept, a novel many-to-many authentication scheme based on passive NFC tags is proposed. In contradiction to ...
详细信息
In this paper, a new paradigm of user authentication called “wireless key” is described. Following this concept, a novel many-to-many authentication scheme based on passive NFC tags is proposed. In contradiction to existing solutions that assume a wireless key to be a battery-powered device with considerable computational power, we suggest to use a passive NFC tag in order to minimise the key size and significantly reduce the costs. The security of all the information on the tag is guaranteed by a specific data encryption scheme constructed on top of strong cryptographic primitives. In our approach, all the computations are performed by the service user is authenticating in, and thus no computational power and no battery on the key side is needed. This comes to an user-friendly, secure and cost-efficient solution. Moreover, the system core - proposed encryption scheme - could be easily applied to any other carrier technologies, as, for example, to Bluetooth Low Energy or Wireless USB. Having generalised our solution to hold an integrity property, it can also be used for another emerging application - secure documents storage.
This paper introduces a variety of analog computing elements utilizing dynamics of DNA strand displacement reactions. In the proposed method, the establishment of functional relationship between the concentrations of ...
详细信息
This paper introduces a variety of analog computing elements utilizing dynamics of DNA strand displacement reactions. In the proposed method, the establishment of functional relationship between the concentrations of inputs and those of outputs at the steady state is regarded as computation. We will propose analog versions of an amplifier, an adder, a multiplier, a divider and a constant gate, which are time responsive. Some further discussion will be made toward the construction of controllers for molecular robots.
Introduction: The ECG Bayesian filtering framework has been shown to be a promising method to extract the foetal electrocardiogram (FECG) from abdominal recordings. This framework requires an estimation of the ECG mor...
详细信息
Introduction: The ECG Bayesian filtering framework has been shown to be a promising method to extract the foetal electrocardiogram (FECG) from abdominal recordings. This framework requires an estimation of the ECG morphology, which is obtained by approximating an average beat with a number of Gaussian kernels. This approximation results in a high dimensional nonlinear optimization problem (finding ideal positions, width and height for these kernels). Methods: Proposed methodologies in the literature initialize the optimization algorithm using fixed positions for the kernel functions. This contribution benchmarks alternative schemes for finding the Gaussian parameters, namely an approach based on the stationary wavelet transform and random search. The goal is minimizing the normalized mean squared error between the average beat and the approximated model, while increasing foetal QRS detection accuracy. Results: The suggested methods are able to produce improved morphology approximations of the averaged beat up 4.05% (depending on the selected method). The proposed method using the stationary wavelet transform improves the goodness of the fit, while reducing the computational load. However, no immediate improvement on the accuracy of FQRS detections was noticed. Such findings render the proposed method a promising tool. However, further research should be directed at transferring the improved fit to an improvement of FQRS detections.
Visual Data Mining (VDM) is supported by interactive and scalable network visualization and analysis, which in turn enables effective exploration and communication of ideas within multiple biological and biomedical fi...
详细信息
A multiuser dual-hop relaying system over mixed radio frequency/free-space optical (RF/FSO) links is investigated. Specifically, the system consists of m single-antenna sources, a relay node equipped with n≥ m receiv...
详细信息
This paper proposes a distributed node election algorithm to efficiently select a subset of nodes which provide full coverage. In addition the boundary of un-triangulated holes can be accurately detected. This algorit...
详细信息
This paper proposes a distributed node election algorithm to efficiently select a subset of nodes which provide full coverage. In addition the boundary of un-triangulated holes can be accurately detected. This algorithm only uses binary connectivity information without any additional information such as sensing range or distance between nodes. Assumptions of a Unit Disk Graph(UDG) or d-quasi UDG network configuration are not required. The number of elected nodes is close to the minimum number of nodes for full coverage as shown in simulations with arbitrary topologies and various densities. The algorithm is scalable to any network size. Its time complexity is only sensitive to the density of the network(or average number of neighbors for each node) and is insensitive to the total number of nodes in the network.
Facial Expression Recognition is the subsequent step after Face Detection and Real time recognition of facial expressions is a challenging task. Various technologies of Facial Expression Recognition has been experimen...
详细信息
There is an issue when security measures are implemented and tested while using agile software development techniques such as Behavior Driven Development (BDD). We need to define the necessary levels of security and t...
详细信息
In this paper, we propose a Remote control of a domestic equipment from an Android application based on Raspberry pi card. Home automation has been recalled in the first stage. In the second stage an application has b...
详细信息
In this paper, we propose a Remote control of a domestic equipment from an Android application based on Raspberry pi card. Home automation has been recalled in the first stage. In the second stage an application has been developed based on the android system. The different diagrams have been presented. Different codes have been developed to allow the communication between the remote user, the web server, the raspberry pi card and the home components. Also an interface card has been developed to assure the communication between the home components and raspberry pi card. The application has been installed on a Smartphone, a web server and a raspberry pi card to order the shutter of windows. The experimental results are successful.
暂无评论