The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart space is created by deploying a Semantic Information Broker (SIB) in a given Internet of Things (IoT) environment. The deployed SIB enables information sharing for many digital devices participating in the IoT environment. In this study, we consider CuteSIB — a new SIB implementation for the Smart-M3 platform, where the class of SIB host devices covers various embedded and mobile devices, in...
In order to cope with the exponential growth of mobile traffic, mobile operators need to access more spectrum resources. LTE in unlicensed spectrum (LTE-U) has been proposed to extend the usual operation of LTE in licensed spectrum to cover also unlicensed spectrum. However, this extension poses significant challenges especially regarding the coexistence between LTE-U and legacy systems like Wi-Fi...
To address the mobile data growth challenges, mobile operators need to access more spectrum resources. LTE in unlicensed spectrum (LTE-U) has been proposed to extend the usual operation of LTE in licensed spectrum to cover also unlicensed spectrum, mainly at 5 GHz band due to its wide spectrum availability. However, this extension poses significant challenges especially regarding the coexistence between...
Big Data is now a widely studied concept in the field of massive processing of information, but testing systems and applications in this field is a difficult task, because the real environments to be used are of a large scale and many times impossible to reproduce. Usually, for this task executions in virtual settings, called simulations, are used. The present article presents a simulator for applications...
Big Data is now a widely studied concept in the field of massive processing of information, but testing systems and applications in this field is a difficult task, because the real environments to be used are of a large scale and many times impossible to reproduce. Usually, for this task executions in virtual settings, called simulations, are used. The present article presents a simulator for applications...
Considering rescue operations, natural disasters, military missions, or similar situations, it is vital for a successful mission and for the safety of all action forces to obtain a realistic and up-to-date overview of the operational area. Easy-to-understand three-dimensional visualizations and attached applications for 3D simulation, training, planning, and assistance provide massive additional benefit...
Mobile cloud computing (MCC) permits mobile users to access the ample cloud computing resources. Mobile applications are pervasive and provide supplementary functionality on mobile devices, but these type of applications consume more battery of the mobile devices. Offloading the power hungry part of the application into the mobile cloud is one of the approach to prolong the battery lifetime of mobile...
This paper describes the process of design and implementation of multimedia foreign language teaching simulation software is an open system, the simulation of the software system can realize multi computer courses in foreign language, practice. Course selection, foreign language selection method using menu, each foreign language simulation with animation, pictures and text forms, which uses the material...
In this paper, we present a mobile-device level approach to estimating the network data (traffic) that is generated over time. While efforts oftentime utilize complex approaches, our model captures the main characteristics in the time and data domains of a high utilization application class as Hidden Markov Model while modeling the remaining applications' characteristics in form of a simple background...
Computation offloading is a hot topic to minimizing the energy consumption in cloud-assisted mobile computing. However, the assumption is that the mobile devices must have network connectivity to cloud. In this paper, we propose an adaptive computation offloading system, called mobile cloud with smart offloading system (MCSOS), which allows that the resource-poor mobile devices could offload its computation...
This paper attempts to explore students¡¦ collaborative learning behavior patterns in different simulation systems. Two mobile CSCL learning environments (Augmented Reality simulation and Traditional simulation) for helping university students to acquire physics knowledge were designed. A total of 40 students, grouped into twenty pairs, were randomly assigned to the two learning environments for conducting...
This paper evaluates the usefulness of different simulators developed in server system testing for a mobile application during 5 years, with the purpose of identifying the advantages and weaknesses of each simulation method in the given setup. The study found that simulation was used on almost every interface to external systems, and two factors that affected the usefulness of simulators over long...
Mobility model is important for the performance analysis of wireless networks. The paper presents an angle mobility model. Based on the model, the characters of the direction angle for terminal mobility are analyzed and a calculation method for handoff rate is proposed. The theoretical closed-formula is derived for handoff rate in the condition that users' moving direction is unchanging in the fixed...
Gasoline spill by tanker accidents are common and usually there is a high health risk involving these events. Having the ability to predict the consequences of such an accident can provide better means to construction of roads and also to mitigate the risk in case of a tanker accident. The purpose of this paper is to present a system for simulating fuel spill scenarios and later asses the risk of...
Our contribution in this paper is twofold: we first analyze the requirements of a secure distributed authentication system for MANETs, and then survey some of the existing certificate-based authentication mechanisms, by analyzing their features, including pros and cons, in the context of distributed authentication. Finally, a series of scenario-based simulation experiments and metrics are proposed...
This paper proposes self-deploying approaches for sensor networks. The gravitational field (GF) and the radioactive decay (RD) are used to model the repulsion forces between sensor nodes. The Received Signal Strength (RSS) is transformed to the repulsion force for computing the next move distance and direction. The GF approach reduces the power consumption on communication overheads while the RD approach...
The value added process of mobile commerce value chain is studied. Technical aspect of mobile commerce has matured, however, development of any industry needs a stable and sustainable benefit pattern, thus the research of value chain could find and enforce the mobile value chain increment, besides pushing the industry forward. First, the activities of different stages in the mobile commerce are analyzed...
This paper presents a comparative study between several mobility models. Simulation environment is a time variant real representation of a city based on GIS, integrating all geographical and socio-economical information relative to this city. Simulation results are the basis of the comparative analysis between the models. This comparison is made by setting metrics evaluating individual and population...
As the Army's operational paradigm shifts toward Network-Centric Warfare (NCW), the use of high performance computing (HPC) assets to aid experimentation in Live, Virtual, and Constructive (L/V/C) environments has become increasingly valuable. Army networks are evolving from hundreds to thousands, to tens-of-thousands of communicating entities, which use an increasing variety of applications, host...
In mobile ad hoc net work, transmitting a packet from source to destination needs cooperation among nodes. Since there may be selfish nodes in the network and these selfish nodes are reluctant to relay packets for other nodes in order to protect resources of their own, the performance of the whole network will be influenced. We propose a cooperative incentive mechanism based on game theory. When determining...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.