The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent times, mobile broadband networks are focused on bringing different capabilities to the edge of the mobile network. Mobile Edge Computing (MEC) addresses this issue by placing the compute and storage resources closer to the Radio Access Network (RAN), with an aim to reduce end-to-end latency, ensure better service delivery, and offer improved user experience. In this work, we propose SDEC...
Recently, mobile broadband networks are focused on bringing additional capabilities to the network edge. For instance, Mobile Edge Computing (MEC) brings storage and processing capabilities closer to the mobile user i.e., at the radio access network, in order to deploy services with minimum delay. In this paper, we propose a resource constrained cloud-enabled small cell that includes a MEC server...
Mobile medical applications are increasingly being used by patients and consumers. However, due to their complexity, these applications are normally only accessible to smartphone users. People using low-end cellphones cannot benefit from this new technology. The goal of this paper is to expand health service platform to lower-end cellphones, so that people in underdeveloped regions can benefit from...
The measurement of consumption of public services such as drinking water and electric energy, and information management is one of the problems facing intelligent cities. In this article we describe the design of a computer system that allows the management and administration of consumption records made by smart meters that communicate through MQTT using mobile telecommunications networks. The results...
The problem of managing the scarce radio spectrum resource is addressed in this paper; based upon the Worldwide Interoperability for Microwave Access (WiMAX) network. Emerging and innovative techniques such as spectrum virtualization and network federation are adopted to enable the sharing of spectrum amongst mobile operators. A novel entity known as the Virtual Spectrum Hypervisor (VS-Hypervisor)...
To alleviate the pressure brought by the explosion of mobile video traffic on present cellular networks, small cell base stations (SBS) with caching ability are introduced. In this paper, we consider the caching strategy using network coding for mobile users over heterogeneous wireless network containing SBSs. We formulate an integer programming problem to minimize the average number of packets downloaded...
As servers are equipped with more memory modules each with larger capacity, main-memory systems are now the second highest energy-consuming component in big-memory servers and their energy consumption even becomes comparable to processors in some servers. Meanwhile, it is critical for big-memory servers and their main-memory systems to offer high energy efficiency. Prior work exploited mobile LPDDR...
Edge computing is an increasingly popular paradigm, wherein computation comes closer to the sources of data. A key challenge for edge computing is discovering and utilizing the heterogeneous resources of the vast number of mobile devices at the network edge. Mobile edge devices hide behind private networks, they are mobile and their owners hesitate to share them due to privacy considerations. We propose...
Heterogeneous vehicular networks (HetVNets) are a promising approach to meet the various communication requirements of vehicular networks' services using a variety of available access networks. However, due to their inherited characteristics, HetVNets are rigid, difficult to manage and suffer from a lack of programmability, flexibility, and scalability. In this paper, we first highlight the limits...
Understanding and predicting cellular traffic at large-scale and fine-granularity is beneficial and valuable to mobile users, wireless carriers and city authorities. Predicting cellular traffic in modern metropolis is particularly challenging because of the tremendous temporal and spatial dynamics introduced by diverse user Internet behaviours and frequent user mobility citywide. In this paper, we...
In this paper, we discuss the singular characteristics of the Internet of Things (IoT) in regard to security issues and present a security architecture with special focus on Edge networks and Smart Things. The architecture is based on the assumption that data integrity, authentication, and service/device access control are the most important aspects that have to be guaranteed for safe operation of...
With the advancements in mobile technologies, different compute-intensive tasks are emerging rapidly. However, due to resource constraints, these tasks are facing challenges to execute on mobile devices. As a solution to this problem, cloud migration has been introduced to execute a task on the cloud and then to return the results to the user mobile device. In this paper, a cloud migration decision-making...
This paper focuses on culture and software development tools issues with respect to the development of a proposed Culture Aware Reference Architecture (CARA) for the delivery of culture competent mobile oriented solutions through culture awareness. The paper presents a discussion of selected architectural design approaches, tools or methodologies that were considered and applied across defined architectural...
Emerging services for Intelligent Transport Systems put the information content at the centre of the communication process, require a seamless support of mobile users, and target a real-time and asynchronous data dissemination. The Information-Centric Networking paradigm has all the potentials to fulfill these requirements, thanks to its ability to distribute contents through publish-subscribe communication...
Thanks to the proliferation of mobile technologies that enable devices to use the network for providing (publish) or requiring (subscribe) information according to specific applications aims, the Internet of Things (IoT) can be considered as the biggest challenge that the industry is currently facing. During the last years several application domains for IoT have emerged and among these the Smart...
The Crowdsensing-based systems using mobile technology create a new kind of collective intelligence in a sensing environment mediated by ICTs. On the other hand, ICTs and social networks contribute to the emergence of virtual communities. The interaction among participants can create dynamically groups from a previously known platform where all participants perform tasks and solve problems in a specific...
Edge computing is a recent paradigm where network nodes are placed close to the end users, at the edge of the network. Efficient management of resources within this configuration is crucial due to scarcity and geographical spreading of edge resources. We begin by a brief description of the edge paradigm, the most generic edge architecture, and the terminology associated to it. Then, we propose and...
A smart campus refers to a campus where modern information and communication technologies bring more convenience to campus life, assist campus users to improve and more efficiently accomplish their daily activities, and enhance social interactions. Regarding the high demand of services such as mining campus users' semantic information, building augmented reality assisted mobile campus and smart class,...
The continuous evolution of mobile networks is demanding and promising. The increase in mobile population, the introduction of new applications and use cases which represents a major shift in the paradigm from voice to data especially with the adoption of the IP network from the internet in the mobile networks. This has imposed challenges in current architecture of mobile networks in terms of backhaul...
To address the risk of location privacy disclosure in location-based services (LBSs), existing solutions generally introduce a single trusted anonymizer between the users and the location service provider (LSP). However, a single anonymizer offers limited privacy guarantees and incurs high communication overhead in continuous LBSs. Once the anonymizer is compromised, it may put the user information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.