The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates the adaptive barrier coverage system in wireless sensor networks, where multiple mobile sensor nodes collaboratively move based on cloud computing. This system aims to adaptively maintain a barrier coverage surrounding a dynamic zone, such as nuclear leakage area and toxic gas area. Since such a zone is usually dangerous and invisible, it is necessary to monitor and track its...
Mobile Operators are looking for new ways to cope with ever-increasing data traffic while improving the operational and capital efficiency of their networks. Cloud computing and network function virtualization (NFV) have emerged as key enablers to optimize resource utilization and at the same time reduce network operational expenditure (OPEX). In virtualized networks, network functions are delivered...
To ensure the required quality of experience and optimal use of network operator's resources in the current conditions telecommunication operator can deploy services using the concept of Network Functions Virtualization (NFV), that has fundamental differences from traditional dedicated hardware. To achieve the expected benefits of NFV, physical resources must be used effectively. This requires effective...
Recent research has reported numerous studies bringing into question the gender inclusiveness of many kinds of software. Inclusiveness of software (gender or otherwise) matters because supporting diversity matters — it is well-known that the more diverse a group of problem-solvers, the higher the quality of the solution. To help software creators identify features within their software that are not...
Requirements Engineering (RE) and all its underlying activities, such as requirements identification, evolution, validation, communication, and management, are still the key factors in successful product development. Therefore, proper implementation of this process is necessary to obtain a quality product. A better understanding of the most challenging RE-related topics for practitioners will greatly...
Software development requires the protection of privacy. However, a body of knowledge does not exist for the development of privacy-aware software. Based on a literature survey, this paper introduces various studies that address knowledge regarding the development of privacy-aware software, and describes the current status and future direction toward building a knowledge base for privacy-aware software...
Mobile dating apps have become a popular means to meet potential partners. Although several exist, one recent addition stands out amongst all others. Tinder presents its users with pictures of people geographically nearby, whom they can either like or dislike based on first impressions. If two users like each other, they are allowed to initiate a conversation via the chat feature. In this paper we...
In order to meet the users' living demand, to provide them a better experience of smart home and further to improve their life equality, the authors design and implement the voice control system of smart home based on iOS. This system uses the classical MVC mode. The third party IFlyTek SDK is used to recognize the input voice. The developers create the project by Xcode, first using the storyboard...
This paper describes the mechanism of addition of smartphone application awareness in the dictionary software. In this method, the environment parameters and the applications running on the smartphone are linked together to provide better benefits in the dictionary learning process. Also, the system wide recommendation provided by dictionary may mislead the user to type the words and hence it is important...
Recent technological advances have accelerated the design and worldwide deployment of mobile payment systems (m-payment). However, m-payment over open devices and networks poses security challenges of a new dimension that users disclose lots of sensitive information and privacy can't be protected properly in open environment. In this paper, we propose a mobile payment architecture employing with trusted...
With the rapid increasing number of mobile devices being used as essential terminals or platforms for communication, security threats now target the whole telecommunication infrastructure. However, most of the software-based passive measurement system (PMS) could not achieve high performance to adapt the high-bandwidth mobile network. In this paper, we propose NTW, a real-time pre-processing system...
The aim of the mobile app "Zirkus Empathico" is to strengthen socio-emotional competences in pre-and primary school children. It's holistic and natural training concept is based on current results of empathy research. Pilot testing of the app revealed it's good usability and comprehensibility. The effectiveness of "Zirkus Empathico" is currently investigated in a longitudinal clinical...
Software Defined Networking (SDN) has attracted tremendous interest in the telecommunication industry due to its ability to abstract, manage and dynamically re-configure end-to-end networks from a centralized controller. Though SDN is considered to be a suitable candidate for various use cases in mobile networks, none of the work so far has discussed its advantages and actual realization for Train-to-Wayside...
The trends are reviewed in the development of unmanned transport systems. There is highlighted an increasingly important part of various range vision/location systems. There is described an architecture of the on-board computer network supplying information to the control systems of the mobile vehicles with the enhanced level of independence and totally unmanned. The proposed architecture provides...
Focused on the issue that the mobile terminal can not remote control each other, a remote control system between Android platforms was proposed. The system is a typical C/S mode, follow the specification of Android application, to achieve the remote control between two Android system developed by Java language. Firstly, it analyzes the key technologies of the system, like the architecture of Android...
The aim of this work is to promote the application of computer science and skills in projecting web-based and mobile systems for training and improving in the field of biomedical engineering. The main role of such project system is reflected in unification and publishing educational contents in the fields of ECG signals, assigned for students and teachers of medicine and biomedical engineering. The...
The deployment of dense networks of Small Cells (SC) is one of the key components of 5G mobile networks and will pose several challenges to the backhaul network. Software-Defined Networking (SDN) is a key technique to cope with the increased management complexity of such heterogeneous deployments, helping in the task of achieving a system-wide network management, which includes the 5G mobile wireless...
Uploading of huge files to cloud servers through mobile communication has been becoming more popular in recent years. However, current uploading throughput is frequently limited due to bottlenecks in server processing ability and/or narrow bandwidth sections of networks. For this study, we aimed to improve the user experience of uploading in future wireless access environments. We propose a novel...
Today, data traffic grows in a more dynamic way than voice traffic and it requires high data rates to support advanced services and applications. Mobile operators must deal with this amount of traffic and must meet user requirements. They must provide more throughput on the transmission path. One of the ways this can be done is to use LTE-Advanced with the carrier aggregation technique. This is one...
Reflective practice is pivotal in ensuring the implemented process of teaching and learning are effective and benefits the students. Through the implementation of reflective practice, all weaknesses and strengths of the educators can be identified and action for improvement can be planned. However, previous research found that majority of educators only reflected on whether or not, in the process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.