scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Ubicomp in 2012"


Journal ArticleDOI
TL;DR: This research effort centralizes on the efforts of implementing an application that employs computer vision algorithms and gesture recognition techniques which results in developing a low cost interface device for interacting with objects in virtual environment using hand gestures.
Abstract: Virtual environments have always been considered as a means for more visceral and efficient human computer interaction by a diversified range of applications. The spectrum of applications includes analysis of complex scientific data, medical training, military simulation, phobia therapy and virtual prototyping. Evolution of ubiquitous computing, current user interaction approaches with keyboard, mouse and pen are not sufficient for the still widening spectrum of Human computer interaction. Gloves and sensor based trackers are unwieldy, constraining and uncomfortable to use. Due to the limitation of these devices the useable command set based diligences is also limited. Direct use of hands as an input device is an innovative method for providing natural Human Computer Interaction which has its inheritance from textbased interfaces through 2D graphical-based interfaces, multimedia-supported interfaces, to full-fledged multi-participant Virtual Environment (VE) systems. Conceiving a future era of human-computer interaction with the implementations of 3D application where the user may be able to move and rotate objects simply by moving and rotating his hand - all without help of any input device. The research effort centralizes on the efforts of implementing an application that employs computer vision algorithms and gesture recognition techniques which in turn results in developing a low cost interface device for interacting with objects in virtual environment using hand gestures. The prototype architecture of the application comprises of a central computational module that applies the camshift technique for tracking of hands and its gestures. Haar like technique has been utilized as a classifier that is creditworthy for locating hand position and classifying gesture. The patterning of gestures has been done for recognition by mapping the number of defects that is formed in the hand with the assigned gestures. The virtual objects are produced using Open GL library. This hand gesture recognition technique aims to substitute the use of mouse for interaction with the virtual objects. This will be useful to promote controlling applications like virtual games, browsing images etc in virtual environment using hand gestures.

96 citations


Journal ArticleDOI
TL;DR: In this article, a survey of interesting features that can be extracted from video data for indexing and retrieval along with similarity measurement methods is presented, where the authors identify present research issues in area of content based video retrieval systems.
Abstract: With the development of multimedia data types and available bandwidth there is huge demand of video retrieval systems, as users shift from text based retrieval systems to content based retrieval systems. Selection of extracted features play an important role in content based video retrieval regardless of video attributes being under consideration. These features are intended for selecting, indexing and ranking according to their potential interest to the user. Good features selection also allows the time and space costs of the retrieval process to be reduced. This survey reviews the interesting features that can be extracted from video data for indexing and retrieval along with similarity measurement methods. We also identify present research issues in area of content based video retrieval systems.

71 citations


Journal ArticleDOI
TL;DR: A new cost-effective way for tracking a vehicle in public transport domain is suggested and proposed technique is compared to some of the methods advised previously for tracking public vehicles.
Abstract: There are lots of efforts being made by public transport corporations to improve public vehicle occupancy by requesting the public to use public transport over other modes of transportation. It can be noted that if the passenger knows with high confidence that the bus is going to come, he/she will definitely wait rather than opting for other modes of transport. Efficient information can therefore help the users to choose faster and more easier connections which saves their time. Trends in wireless technology like Global System for Mobile communication (GSM) and Radio Frequency Identification (RFID) have resulted in easier and faster communication. This paper presents a vehicle tracking system by integrating both of the above mentioned technologies. The central server uses geographic information system (GIS) to track vehicles to display the position information on the electronic map. This paper suggests a new cost-effective way for tracking a vehicle in public transport domain and compares proposed technique to some of the methods advised previously for tracking public vehicles.

10 citations


Journal ArticleDOI
TL;DR: An attempt has been made to analyze impact of DOS, SQL injection, Cross site scripting, Sniffing/ Request Encoding on web application in terms of throughput and response time etc and it also provides the best protection mechanisms for the said attacks.
Abstract: The World Wide Web has experienced remarkable growth in recent years hence security is becoming one of the major promising taskin the present scenario of e-business environment. Web attacks candevastate the system within no time. More than 80% attacks are at application layer and almost 90% applications are vulnerable to these attacks. Traditional solution is not capable to protect the web from such attacks.This paper handles different web attacks and also provide some tricks used by hackers to hack the web world similarly it contains an attempt has been made to analyze impact o f DOS, SQL injection, Cross site scripting, Sniffing/ Request Encoding on web application in terms of throughput and response time etc. It also provides the best protection mechanisms for the said attacks. Our main aim is to analyze both E application one with security (proposed E –Tracking system) and another without security and find the impact of all above attacks on both in terms of request time, response time & throughput etc.

6 citations


Journal ArticleDOI
TL;DR: In this paper, a weighted graph is formed based on targeting the important key phrases, so that a focused crawler can do the fetching of the complete texts of the related Web pages, based on the weighted graph.
Abstract: Getting informed of what is registered in the Web space on time, can greatly help the psychologists, marketers and political analysts to familiarize, analyse, make decision and act correctly based on the societys different needs. The great volume of information in the Web space hinders us to continuously online investigate the whole space of the Web. Focusing on the considered blogs limits our working domain and makes the online crawling in the Web space possible. In this article, an architecture is offered which continuously online crawls the related blogs, using focused crawler, and investigates and analyses the obtained data. The online fetching is done based on the latest announcements of the ping server machines. A weighted graph is formed based on targeting the important key phrases, so that a focused crawler can do the fetching of the complete texts of the related Web pages, based on the weighted graph.

6 citations


Journal ArticleDOI
TL;DR: This contribution provides enough evidence to prove the first introduced protocol vulnerability to de-synchronization attack, and appropriate solutions to fix the security flaws concerning the two described protocols for secure RFID applications.
Abstract: Widespread attention is recently paid upon RFID system structure considering its ease of deployment over an extensive range of applications. Due to its several advantages, many technical articles are published to improve its capabilities over specific system implementations. Recently, a lightweight anti-desynchronization RFID authentication protocol and a lightweight binding proof protocol to guard patient safety are proposed. This contribution provides enough evidence to prove the first introduced protocol vulnerability to de-synchronization attack. It also provides the other protocol's suffering from desynchronization attack as well as tracking the movements of the tags. This paper also addresses appropriate solutions to fix the security flaws concerning the two described protocols for secure RFID applications.

6 citations


Journal ArticleDOI
TL;DR: A novel approach of preclusion and uncovering of Input Validation attacks like SQL Injection, Cross Site Scripting and Buffer Overflow is introduced by incorporating security in software development life cycle by introducing a defense mechanism model.
Abstract: The software life cycle was in use to develop the good software. Now a day’s the software development life cycle should incorporate the security features. Input Validation Attacks are one of the most wide spread forms of vulnerability on the Web application. Our main intention is to focuses on detection and prevention of Input Validation attacks like SQL Injection, Cross Site Scripting and Buffer Overflow by incorporating security in software development life cycle. We have introduced a novel approach of preclusion and uncovering of Input Validation Attacks. SQL Injection , Cross Site Scripting, A buffer overflow attacks, experimentations are made to do these attacks on various sides and the defense mechanism model is proposed to avoid these attacks on the code.

3 citations


Journal ArticleDOI
TL;DR: The main goal of this research was to design a generic system that facilitates association of two co-located devices by demonstration of physical proximity in ubiquitous computing environments and to evaluate the overall system.
Abstract: Ubiquitous computing systems are becoming more common nowadays. Usually, these systems are composed of several modern hand-held devices, which support wireless communication in some form, such as WiFi, IrDA, Bluetooth, etc. Since wireless communication is open to everyone, the issue is how to pair two unassociated devices securely. Consequently, a wide community of industrial as well as academic researchers have proposed more than two dozen schemes and protocols that use various forms of out-ofband channels to pair the two devices securely. The main goal of the research community working on this issue has been to develop and/or propose such pairing systems/schemes, which should be automatic, secure and usable. One such system is proposed by Malkani et. al. [1]. The main goal of this research was to design a generic system that facilitates association of two co-located devices by demonstration of physical proximity in ubiquitous computing environments. In this paper, we are presenting the usability study of several pairing schemes and the proposed system, which was carried out to evaluate the overall system.

3 citations



Journal ArticleDOI
TL;DR: The purpose of this framework is to provide a formal basis for their performance evaluation and behavioral study of the SDP, where the external behavior of the system can be predicted and compared to a model of expected behavior from the original requirements.
Abstract: Service Discovery Protocol (SDP) is important in ubiquitous applications, where a large number of devices and software components collab orate unobtrusively and provide numerous services without user intervention. Existing service discovery schemes use a service matching process in order to offer services of interest to the users. Potentially, the context information of the users and surrou nding environment can be used to improve the quality of service matching. We propose a C -IOB (Context- Information, Observation and Belief) based service discovery model, which deals with the above challenges by processing the context information and by formulating the beliefs based on the basis of observations. With these formulated beliefs the required services will be provided to the users. In this work, we present an approach for automated validation of C-IOB based service discovery model in a typical u biquitous museum environment, where the external behavior of the system can be predicted and compared to a model of expected behavior from the original requirements. Formal specification using SDL (Specification and Description Language) based system has been used to conduct verification and validation of the system. The purpose of this framework is to provide a formal basis for their performance evaluation and behavioral study of the SDP.

2 citations


Journal ArticleDOI
TL;DR: This paper presents some efficient attacks against an authentication protocol so-called Pasargad, designed for RFID-based electronic voting systems, which has some structural flaw which may prevent to execution the protocol.
Abstract: In this paper we analyze an authentication protocol so-called Pasargad which proposed by Arjemand et al. [1]. The Pasargad protocol is a distance bounding protocol which has been designed for RFID-based electronic voting systems. The designers have claimed that this protocol is more secure than Preneel and Single protocol [2], against relay attacks. However, in this paper, we present some efficient attacks against it. Our attacks include conditional impersonation attack and recovery key attack. Moreover, we show that this protocol has some structural flaw which may prevent to execution the protocol.