IEEE 2015 Android Project

Personal Lung Function Monitoring Devices for Asthma Patients

Asthma affects over 300 million people worldwide. Asthmatics experience difficulty in breathing and airflow obstruction caused by inflammation and constriction of the airways. Home monitoring of lung function is the preferred course of action to give physicians and asthma patients a chance to control the disease jointly. Thus, it is important to develop accurate and […]

Snap n’ shop: Visual search-based mobile shopping made a breeze by machine and crowd intelligence

The increasing popularity of smartphones has significantly changed the way we live. Today’s powerful mobile systems provide us with all kinds of convenient services. Thanks to the wide variety of available apps, it has never been so easy for people to shop, to navigate, and to communicate with others. However, for some tasks we can […]

An Active Learning System Using Smartphone for Improving Students Learning Concentration

In our previous work, it has been shown that the students can improve the learning process by using smartphones. For the professors of the university, it is difficult to offer all necessary information to the students. In addition, they cannot provide the information to satisfy all students because the quantity of knowledge of each student […]

A satellite based localisation service using a 3G mobile phone as an emergency terminal.

In this paper, a new satellite based search and rescue system is designed. The old one – the COSPAS-SARSAT distress alert detection and distribution system, has been working for 30 years and rescued about 40 thousands of lives world-wide, in spite of low precision of the distress localization and long localization time. In this paper, […]

Emergency satellite communications: research and standardization activities

Space communications is an ideal candidate to handle critical and emergency situations arising on a regional to global scale, provided there is effective integration among them. The article presents a review of solutions offered by space communication systems for early warning and emergency communication services. It includes an up-to-date review of public research and standardization […]

Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation

            This work proposes a novel reversible image data hiding (RIDH) scheme over encrypted domain. The data embedding is achieved through a public key modulation mechanism, in which access to the secret encryption key is not needed. At the decoder side, a powerful two-class SVM classifier is designed to distinguish encrypted and non-encrypted image patches, […]

Launch vehicle tracking enhancement through Global Positioning System Metric Tracking

United Launch Alliance (ULA) initiated operational flights of both the Atlas V and Delta IV launch vehicle families in 2002. The Atlas V and Delta IV launch vehicles were developed jointly with the US Air Force (USAF) as part of the Evolved Expendable Launch Vehicle (EELV) program. Both Launch Vehicle (LV) families have provided 100% […]

Students’ performance evaluation in online education system Vs traditional education system

Nowadays most of the education institutes practice online teaching mechanism rather than using the traditional teacher centered teaching mechanism to enhance the learning ability of the students by making a student centered learning mechanism. The teachers have to evaluate the students’ performance no matter what their learning mechanism is and there are ways of doing […]

Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography

This paper proposes a lossless, a reversible, and a combined data hiding schemes for ciphertext images encrypted by public key cryptosystems with probabilistic and homomorphic properties. In the lossless scheme, the ciphertext pixels are replaced with new values to embed the additional data into several LSB-planes of ciphertext pixels by multi-layer wet paper coding. Then, […]

A Usable Android Application Implementing Distributed Cryptography for Election Authorities

Although many electronic voting protocols have been proposed, their practical application faces various challenges. One of these challenges is, that these protocols require election authorities to perform complex tasks like generating keys in a distributed manner and decrypting votes in a distributed and verifiable manner. Although corresponding key generation and decryption protocols exist, they are […]