The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobility management is an essential feature of cellular networks. High accuracy of mobile user positioning is needed to handle mobility efficiently enough and bad cell data can harm this feature significantly. Inaccuracy of cell shapes, lack of cell data measurements, and inaccurate coordination in a geographical area are major shortcomings when it comes to positioning of mobile users in cellular...
Recent emergence of diverse services have led to explosive traffic growth in cellular data networks. Understanding the service dynamics in large cellular networks is important for network design, trouble shooting, quality of service (QoE) support, and resource allocation. In this paper, we present our study to reveal the distributions and temporal patterns of different services in cellular data network...
With the continuously development of enterprise informatization, the effect of group enterprise scale effect and fine management preliminary reveals, scientific decision-making difficulty is greatly increased, business intelligence applications demand urgently. Against this backdrop, this paper through the research of BI and a company using the BI components for nuclear power maintenance business...
Data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations with limited potential or expensive experimental studies, the research in user-mobility or spatio-temporal user behavior can be conducted on publicly available datasets such as the Reality Mining Dataset. These data have been...
We present an information infrastructure in which Agile Virtual Enterprise (AVE) Supported by Fourth Party Logistics (4PL), named 4PL-AVE. At first, the difference between AVE and 4PL is introduced, and then 4PL-AVE model architecture is given that consists of three-dimensional cube of life-cycle dimension, the view model dimension and universal level dimension which complete describe the 4PL-AVE...
Pocket Data Mining (PDM) is our new term describing collaborative mining of streaming data in mobile and distributed computing environments. With sheer amounts of data streams are now available for subscription on our smart mobile phones, the potential of using this data for decision making using data stream mining techniques has now been achievable owing to the increasing power of these handheld...
SMS-based queries and responses are exchanged between mobile stations and central database servers in many contemporary client-server applications through point-to-point short message service (SMS-PP). Control plane signalling between different nodes of public land mobile network (PLMN) is much larger than message sizes in SMS-PP. Congestion in mobile network is caused by upsurge in signalling bandwidth...
Configurable computing (CC) that combines the computational benefits of custom ASICs and flexibility and reconfigurability of general-purpose microprocessor has opened a new and exciting era for designing mobile software services. In particular, the increased computational density of programmable logic devices has the potential to lead to real-time mobile software and services that require fast matrix...
Integrated light rail transit (LRT) system in the capital of Malaysia connects some key districts to historical places, interesting places, business areas and shopping malls are concentrated. The train services are running independently but have interchanges to integrate from one different LRT lines. This may leads the traveler facing difficulty when they are choosing incorrect destination station...
In this paper, we present further research achievements due to hand-OLAP, a Java-based distributed system that relies on semantics-based intelligent data cube compression techniques, and effectively and efficiently supports OLAP in mobile environments. Hand-OLAP is based on a systematic approach according to which first a two-dimensional OLAP view of interest is extracted from the target multidimensional...
In this paper we propose an integrated approach for managing variabilities in architectural specifications of software product lines. Our approach combines an aspect-oriented architectural description language for product lines, PL-AspectualACME, with a variability modeling language, VML4Arch. PL-AspectualACME, also proposed in this paper, is used to specify the overall architectural description consisting...
Many shortcomings in radio frequency identification (RFID) systems stem from the underlying communication architecture; affecting performance, scalability and usability. This paper remedies such hindrance by introducing the novel paradigm of distributed receiving in RFID systems. The proposed scheme entails dispersing the routine functions of conventional readers onto spatially distributed entities,...
Due to the aging population society coming, more and more families need the in-time service of medical care for the elderly. For creating a healthy and safety living environment, this study is applied to the radio frequency identification (RFID) and the software agent technology to develop the pervasive health service grid. This framework is based on the grid architecture to provide patients health...
The richness of functions and the availability of data make the Web the real service platform. Telecomm operators are using an old approach to a new All-IP infrastructure. This enables the WebCos to become the major Service Providers of next generation networks. TelCos should instead use the Web APIs and the cloud computing infrastructure to build services. They should also provide interworking functions...
With the proliferation of new online services and wireless personal devices, location-based services and applications for mobile users are widespread in use today. But the privacy of these users exposes to others increasingly in accessing those location based services. Exposure of the location information may result in privacy threat by malicious servers and hackers. In this paper, we propose a new...
We describe a novel approach for managing self-organizing, distributed modular components in dynamically changing environments. The main concept is to fabricate a system which is composed of dynamically associated modular agents, that can migrate and reorganize by itself while the system is being executed. Association between modular agents can be varied and transmuted according to components' own...
Home NodeB, with the characteristic of self-management, is a newly developed technology to improve the indoor coverage and network capacity for integrated operators. It is expected to substantially reduce the necessary human intervention in network operations, with a significant reduction in operational expenditure (OPEX) and improvement in service quality. In this paper, we analyze Home NodeB's self-management...
Motivated by the phenomenal capabilities of the human immune system (HIS) in defending the human body against dangerous foreign agents, this paper proposes an HIS-inspired survivability framework to address security threats in Next Generation Mobile Networks (NGMN). In particular, the proposed framework incorporates two key components: namely, the attack detection framework and the security control...
This paper develops a client-side context-aware search application which is built on the context-aware infrastructure. A context-aware architecture is designed to collect the mobile user's context information, derive mobile user's current context, distribute user context among context-aware applications, and support the context-aware applications. The context acquisition is centralized at the context...
A distributed security MIPv6 model based on dynamic policies is presented to solve the security compatible problem between MIPv6 nodes and the access network. We combine the distributed defensive structure and MIPv6 to build a distributed secure MIPv6 structure based on policies, and implement the dynamic transference of secure policies during mobile nodespsila movement, thus to make the model has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.