The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, the number of mobile devices is increasing rapidly. Meanwhile, the amount of malicious software is rising almost exponentially, alongside the diversity and complexity of malware. The flexibility of Software-Defined Networking (SDN) provides an opportunity to develop a malware detection model in more efficient and flexible manner. In this paper, we propose a network behavior-based...
In wireless coded cache network, data contents are cached in a number of mobile devices using an erasure correcting code, and a user retrieves content from other mobile devices using device-to-device communication. In this paper, we consider the repair problem when multiple devices that cache data contents fail or leave the network. By exploiting the wireless broadcast nature, we formulate the repair...
This study aims to design a web technology based Emergency System (SmartER) system, which will enable the doctors and nurses to perform the patient related procedures more quickly and smoothly in the emergency departments. SmartER is not just software, it is planned as a system that includes a monitor screen to be mounted on the wall, a barcode bracelet for the patients, mobile devices to be used...
Pervasive networks formed spontaneously by wireless mobile devices capable of ad hoc communication make it possible to get services from these devices, and to compose them dynamically so as to provide people with new and more sophisticated application services. Discovering, invoking and composing services in such networks are challenging tasks, due to the numerous and unpredictable connectivity disruptions...
We propose a signal-channel, adaptive threshold selection technique for binary mask construction, namely APHONIC, (AdaPtive tHreshOlding for NoIse Cancellation) for smart mobile environments. Using this mask, we introduce two noise cancellation techniques that perform robustly in the presence of real-world interfering signals that are typically encountered by mobile users: a violin busker, a subway...
The next generation cellular networks are predicted to face the challenge of massive data transmission originated from Machine Type Communication (MTC) devices with limited communication resources. The main objective of this paper is to reduce communication resources consumption in acceptable transmission latency for massive data generated from MTC devices. As an attempt to solve this challenge, a...
Explosion of mobile traffic will bring a heavy burden to the core network, and rapid growth of mobile devices, as well as increasing demand for delay-sensitive services poses severe challenges to future wireless communication systems. In this regard, local breakout is a promising solution to save core network load and, more importantly, to reduce end-to-end (e2e) delay of packets with local significance...
The main objective of this research project was to identify factors promoting the adoption of m-health and determine usability challenges in the existing m-health applications in Kenya. Specifically the study aimed at i) establishing the factors promoting adoption of M-health and, ii) determining the usability challenges in m-health applications in Kenya. Consequently an M-health prototype application...
Mobile phone technology has increasingly been used as a tool for accessing market information in Sub-Saharan Africa. However little has been done in the development of mobile technology applications to improve women entrepreneurs' empowerment and entrepreneurship. This study aims to explore the women entrepreneur users' requirements needed to develop technological innovations for accessing market...
In this paper we explore the problem of providing selective read/write access to the outsourced data for clients using mobile devices in an environment that supports users from multiple domains and where attributes are generated by multiple authorities. We consider Ciphertext-Policy Attribute-based Encryption (CP-ABE) scheme as it can provide access control on the encrypted outsourced data. One limitation...
Computation offloading is a key technique to enhance the performance and interactivity of mobile application through migrating the computation-intensive tasks to the cloud. However, efficient offloading is challenging in practice in that a mobile application often consists of computation tasks that have dependency with execution order constraints as well as parallel tasks that can be executed non-deterministically...
Computation offloading has received much attention to improve the performance or energy efficiency of mobile systems that have usually limited and constrained resource capacities. Yet, applying the computation offloading technique in opportunistic networks that are highly dynamic and often become volatile still remains a challenge due to the following reasons: (1) technical difficulties in constructing...
Mobile Cloud Computing (MCC) leverages resourceful data centers that are distant (aka the cloud) or closely located (aka edge servers) for computational offloading to overcome resource limitations of modern mobile systems like smartphones or IoT devices. Many research works investigate context-aware offloading decision algorithms aiming to find the best offloading system at runtime. However, all approaches...
Mobile computing devices facilitate our daily lives, however, overuse of such may cause visual discomfort or even injure our eyes. Thus, personal visual health management is very important. Current eye fatigue examination methods include the critical flicker fusion test and Heuer's 10-point scale questionnaire. However, the flicker fusion system is too heavy and too expensive for general use by average...
Anticipatory mobile computing is an emerging research field in pervasive environments. However, building multiple anticipatory applications to proactively support a user on his behalf still involves a disproportionate effort through their interdisciplinary nature and individual complex development from scratch. In this paper, we present architectural concepts and a reference implementation of a distributed...
Achieving high QoE for AR applications on a mobile device is challenging because the required advanced computer vision and machine learning algorithms are computationally intensive by nature. Hence, some task for AR applications must be offloaded to more powerful remote servers. Offloading for mobile applications remains an active area of research. In the context of mobile AR applications which requires...
We present in this paper empirical findings from a lead-in study addressing the coping strategies adopted by people with low vision to increase the effectiveness of their touch input performance for standard target acquisition tasks on mobile devices. We evaluate the touch input performance of five people with various eye conditions by examining the accuracy and time duration of their touches and...
We propose a novel way of estimating Macroscopic Fundamental Diagrams (MFD) (or often also called Network Fundamental Diagrams) from mobile phone signaling data under the assumption that vehicles can be identified from the data stream. We run a simulation study to identify whether MFDs can be constructed from this type of data. We co-simulate the road traffic in Luxembourg City and one mobile operator's...
Nowadays, mobile devices are equipped with a number of radio transceivers which are active every day and everywhere. As a result, vast amounts of data and technical logs are collected by mobile operators. For this reason, mobile phones have a great potential for sensing urban and rural mobility and population displacement. Therefore, in this article, we are proposing a new approach for estimating...
The popularity of Location-Based Services (LBSs) has resulted in varieties of applications with more conveniences in our daily life. However, since mobile users need to submit some sensitive information to the untrusted LBS servers, they may lose their privacy while they are enjoying the provided social activities. In this paper, we first point out and define the Time-Sensitive Side Information (TSSI)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.