The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper identifies that the anycast communication pattern is needed in the Machine Type Communications (MTC), where there could be multiple MTC devices being deployed in the same area for the same type of data, the client only cares about the data being retrieved but not where the data comes from. Currently the MTC server can provide such anycast service, but with large signaling overhead and bandwidth...
We study the optimum scheduling of a pushing-based information delivery system, where information is sent from a server to mobile users by using server-initiated pushing actions. Information arrives at the server at random. The server adopts a “hold-then-serve” strategy, where new information is temporarily stored in queue for a later one-time transmission. Based on the current queue status, at any...
Recent studies have suggested that the stability of peer-to-peer networks may rely on persistent peers, who dwell on the network after they obtain the entire file. In the absence of such peers, one piece becomes extremely rare in the network, which leads to instability. Technological developments, however, are poised to reduce the incidence of persistent peers, giving rise to a need for a protocol...
The evolution of the Internet of Things (IoT) is bringing Cloud services closer to the networks' edge. Thus, fog networking presents itself as an approach aiming to utilize more and more resources in network edge devices to provide various networking tasks. This work presents an optimization formulation that minimizes the cost of executing a set of services, taking into account the availability of...
Network virtualization and SDN-based routing allow carriers to flexibly configure their networks in response to demand and unexpected network disruptions. However, cellular networks, by nature, pose some unique challenges because of user mobility and control/data plane partitioning, which calls for new architectures and provisioning paradigms. In this paper, we address the latter part by devising...
5G operators will utilize mobile edge computing (MEC) to shorten transmitting latency and fulfill the requirements of increasing mobile applications for high bandwidth and ultra-low latency. A mobile online system (MOS) supports mobile online applications to trigger events in the mobile devices, refresh data, and maintain data consistency in the clouds. As users run mobile online applications, a MOS...
With the various technological advances, mobile devices are not just being used as a means to make voice calls; but are being used to accomplish a variety of tasks. Mobile devices are being envisioned to practically accomplish any task which could be done on a computer. This is hurdled by the limited computational resources available with the mobile devices due to their portable size. With the mobile...
Thanks to the fact that Belgium is a densely populated country, and also lags behind in the roll-out of Long Term Evolution (LTE) / 4G, it is still possible to visit areas enjoying different Radio Access Technology (RAT) coverages within a limited territory. This paper reports an analysis of the dataset of web requests collected through a field survey mostly performed in south-western Belgium and...
Nowadays, Banking is a essential of human life. Customer's informationis stored by the bank. This information is private and saving securely in the database. Customer can process transactions tasks both online and offline manner. Bank transactional activities the attacker easy to hack the details. In this situation we have to protect the bank account. At the point when user input their passwords in...
We analyze the design space for implementing the Constrained Application Protocol (CoAP) within Content-Centric Networks (CCN), identifying several CoAP specific scenarios and seeing how they map to CCNs. We present an evaluation, recommendations for implementations and extensions, and directions for future work. Our key result is that while several protocol features and flows map naturally, some...
Mobile Crowdsensing is a promising paradigm for ubiquitous sensing, which explores the tremendous data collected by mobile smart devices with prominent spatial-temporal coverage. As a fundamental property of Mobile Crowdsensing Systems, temporally recruited mobile users can provide agile, fine-grained, and economical sensing labors, however their self-interest cannot guarantee the quality of the sensing...
The wide spread of smart mobile devices such as tablets and phones makes mobile crowdsensing a viable approach for collecting data and monitoring phenomena of common interest. Smart devices can sense and compute their surroundings and contribute to mechanisms that examine social and collective behaviours. Crowdsensing offers a feasible alternative to exchange and compute sensing tasks and data between...
Mobile messaging has become a trend in our daily lives. The current schema for messaging is to route all the messages between mobile users through a centralized server. This scheme, though reliable, creates very heavy load on the server. It is possible for users to communicate through peer-to-peer (P2P) connection, especially over urban networks characterized by heavy user traffic and dense network...
One of the biggest challenges teachers are facing is the inability of students to interact with each other. The instructor may ask for students' opinion, their ideas and whether they agree or disagree on a given problem or statement, without getting any feedback. However, some students have communication difficulties, and those who can have the correct answer may feel uncomfortable, and therefore...
The arithmetic correlation has been studied in the binary sequences and Boolean functions, the ideal arithmetic correlation sequences can be used in mobile communication authentication with their properties, such as the large number and the independent certification. In this paper, a new class of no-linear Boolean functions are described and their arithmetic correlation are analyzed. And based the...
It is widely expected that the core of next-generation cellular networks will be (i) based on software-defined networking (SDN) and network function virtualization (NFV), and (ii) shared between multiple parties, including traditional mobile operators and content providers. Such parties are normally competing with each other; however, they can obtain significant, mutual benefits even from limited...
This paper proposes a group-based emergency guiding system for mobile users using smartphones, called Go FAST, which can model the spatiotemporal mobility of indoor people. A dedicated path can be determined to provide the shortest evacuation time for each group of nearby people. The Go FAST system considers the corridor capacities and lengths, exit capacities, concurrent motion, distribution of indoor...
In recent years, the rapid development of intelligent dietary planning mobile systems, combined with the cloud technology, provides more intuitive and convenient experience for users on the diet recording and suggestion. However, this mobile-cloud structure will cause the privacy issue. Unlike the past researches which mainly focus on the user interface, response speed and suggestion accuracy, we...
The senior project course for engineering students has a vital role in enhancing the “learn by practice” education engineering students in any university. The senior project course is, usually, a two semester course. This short time frame, poses challenges for both students and faculty. Students have to achieve the outcomes of the project to a certain extent and the faculty has to manage, follow up...
Crowdsensing has been used quite regularly in recent years to study smartphone usage. However context information associated with smartphone usage is mostly of the type geo-localisation, user mobility, temporal behavior etc. Furthermore most studies are not sufficiently user-centric i.e. don't consider the perception or cognitive aspects of the user. In this paper we collect data about social context...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.