The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, the development of telecommunication fields is growing rapidly. One of the important issues in the development of telecommunications is the expansion of public mobile network infrastructures, i.e., base stations. However, the development of base stations requires substantial funds. Currently, there is a solution in building base station infrastructure with more efficient and cheaper by using...
VANETS are a sub area of MANETS (is Mobile Ad hoc Networks that can configure itself without wires) where the dynamic ad hoc network is composed of vehicles as nodes. Vehicles utilizing wireless communication capabilities are termed as “computers networks on wheels” having data sharing capabilities. Vehicles can obtain either information from Road side base station or rely upon other vehicles for...
Internet traffic monitoring and analysis have been a very essential way in network management and optimization for the ISP. GPRS networks are increasingly carrying Internet traffic for Web browsing, Email and online games etc. In this paper, we proposed a Hadoop based cloud computing platform for high-speed network traffic analysis. We experimentally prove that our platform is capable of analyzing...
With the evolution of mobile network from 2.5G to 3G, the development of e-commerce to the mobile e-commerce contributes to the fact that mobile e-commerce will be the important content in the future mobile application. The present paper introduces in detail the advantages and disadvantages of core technologies appeared in recent years which support the development of mobile-ecommerce and analyzes...
This document provides detail on the implementation of a location awareness system which gives the user's current location, sends this location using SMS (Short Message Service) plus sharing location with friends and family and view them on Google maps. Users can also take benefit of this application in emergency situations by using emergency feature of this application. To get the location coordinates,...
This paper describes our concept, design and current implementation of the Secure Mobile Wallet. Mobile Wallet is an application stored in mobile phones providing to subscribers the possibility to perform various mobile financial transactions. In our approach Secure Mobile Wallet is stored and running in the Javacard SIM chip, called UICC. It comprises several Javacard applets supporting several types...
Present 3G Mobile Devices are often supports multiple communication technologies. If software developers want to control the configuration or monitor the characteristics of active Radio Access Technologies (RATs), their mobile applications will have to use different programming interfaces for each technology on various supported platform. We propose Modular Data Link Layer M-DALL for a NEXT GEN Mobile...
For the purpose of enhancing the management level of the meter reading of power enterprises, web services based GPRS automatic meter reading system is put forward. In this paper, the characteristics of GPRS technology and Web Services technology are analyzed, and the architecture of web services based GPRS automatic meter reading system is designed. The front-end based on the GSM/GPRS network is implemented...
Abstract-It is common that current mobile devices are equipped with multiple interfaces such as GPRS or UMTS for wireless WAN (WWAN) link as well as WiFi and/or bluetooth for local networking. Meanwhile, it is also possible that a number of mobile subscribers keep close for a period of time and fetch and play same live stream from Internet. Stimulated by these facts, we develop C5, a Collaborative...
Future wireless network must be able to coordinate services within a diverse network environment. One of the challenging problems for coordination is the selection of optimal network depending upon the type of demanding application. There are different types of Internet applications and network interfaces. The quality of service requirement varies from one application to another. The present work...
Nowadays, users of mobile phones generate too many files that have to be frequently downloaded to an external storage repository (freeing local space), using a USB cable or a short-range wireless connection such as Bluetooth. This situation is very common in developing countries where there are not many available wireless networks, restricting the user mobility. This paper presents an Internet File...
Mobile devices nowadays are widespread and provide great multimedia capabilities, which make the delivery of mobile learning a more realistic approach since it can provide just in time learning on the move. Currently, students in some universities can watch live lectures or tutorials on their university website after a registration process. Some students who face difficulties in attending their lectures...
Nowadays, users of mobile phones generate too many files that have to be frequently downloaded to an external storage repository, restricting the user mobility. This paper presents a File Transfer Service (FTS) for mobile phones with scare storage resources. It is a support that can be used through a set of functions (API) that facilitates file transfer between mobile applications and external storage...
In the idea to create a realistic model of mobility and traffic for the networks of 3rd and 4th generation, we have studied many techniques of modeling and planning. Our choice was for the real network traces exploitation techniques, mainly because compared to other techniques this technique is very adapted to the real modeling. Although this technique is most convenient, it has many disadvantages...
Roaming across different access technologies permit people to access Internet via heterogeneous wireless networks such as WLAN, WiMAX, GPRS, 3G and Beyond 3G networks. The convergence of heterogeneous wireless access networks with handoff support enable mobile nodes to freely move in and out of any available networks without breaking the connection to the Internet. In this paper, an Adaptive Cross...
With devices like mobile phones and PDAs becoming pervasive especially among students, there is a demand for viewing lecture videos on such devices, to get quick access to educational content. But, being traditionally designed for desktop computers, lecture videos have high video bit-rates, due to which viewing them on low network bandwidth connections like GPRS incurs long delays and high costs....
The large scale adoption of mobile phones brings a merging mobile commerce market. Most wireless applications are based on GPRS to provide services in wide areas, while some location based services are based on Bluetooth to enable mobile users to enjoy proximity services. However, very few systems marry the two communication technologies together to provide a more pervasive wireless system with which...
The increasing demand for broadband services is causing the cellular network providers to consider for the integration of Wireless LAN with GPRS. WLAN is having higher data rate but low coverage area but GPRS is having lower data rate but with high coverage area. So integrating these two heterogeneous networks will lead to utilization of advantages of both and can increase the system throughput. The...
Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit...
With the development of wireless communication technologies and mobile Internet, the demand for the ubiquitous service is increasing dramatically. However, there are many critical issues which prevent the performance in accessing the ubiquitous heterogeneous wireless networks. So the subject has become the focus of many research institutions. We establish a practical testbed which includes the different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.