The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a novel range-free localization algorithm tailored for mobile wireless sensor networks (MWSN)s. In contrast to the most existing range- free algorithms, the nodes mobility is taken into accounts when designing our algorithm. We show that nodes are able to estimate their positions using solely their locally-available information, thereby avoiding any unnecessary overhead and...
Pedestrian position tracking is essential in implementing many of the new location based services in cellular networks. The ability for positioning in non-line of sight (NLOS) environments has made cellular network based positioning highly popular. However, the position estimation fine-tuning step in the current cellular network based positioning algorithm is not utilizing the available information...
With the rapid development of the mobile computing and wireless network technology, the mobile telehealth system has been used more and more widely. An important issue of the telehealth system is that too many network traffics are generated while transferring data from the sensors to servers. To solve this problem, we propose a differential algorithm for reducing the network traffics of the telehealth...
The comprehensive analysis on historical and real-time big data delivers huge business value, explores business intelligence, and assists in developing marketing strategies. This talk uses traffic information cloud as an example to show how big data is used to improve the accuracy and coverage of traffic information. Taiwan government is investing Traffic Info. cloud services to bring new business...
Recent widespread use of smartphones and rich multimedia contents has brought a considerable increase in mobile traffic. Therefore, the characteristics of smartphone traffic need to be considered when designing mobile core networks. Smartphone traffic is categorized by whether it is generated from user interaction (foreground (FG) traffic) or not (background (BG) traffic), and such traffic types can...
The growing utilization of Internet administration in the recent years has facilitated an increment in the various types of attacks. Despite the best protection measures, many attacks have been effectively done against many organization and enterprises. Anomaly detection, misuse detection are used to detect various type of attacks. Anomaly detection produce high rate of false alarms and the later...
Positioning techniques are known in a wide variety of wireless radio access technologies. Traditionally, Global Positioning System (GPS) is the most popular outdoor positioning system. Localization also exists in mobile networks such as Global System for Mobile communications (GSM). Recently, Wireless Local Area Networks (WLAN) become widely deployed, and they are also used for localizing wireless-enabled...
The wide deployment of Wi-Fi networks empowers the implementation of numerous applications such as Wi-Fi positioning, Location Based Services (LBS), wireless intrusion detection and real-time tracking. Many techniques are used to estimate Wi-Fi client position. Some of them are based on the Time or Angle of Arrival (ToA or AoA), while others use signal power measurements and fingerprinting. All these...
Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDS for MANETs have attracted much attention recently...
The high latency nature of mobile network limited the use of mobile cloud storage, especially for these applications with frequent random accesses to a large set of small files. Prefetching techniques are usually utilized to overcome the latency problem, but most existing prefetching algorithm cannot prefetch enough data to alleviate the negative effect of high latency in a random access sequence...
In mobile ad hoc networks (MANETs), locationbased service (LBS) is a typical application. In a LBS, it is valuable for each node to grasp the convex hull of nodes which compose a network by using a convex hull query. However, if the query-issuing node acquires the information on all the nodes, the information on nodes which are not the vertexes of the convex hull is replied, which is unnecessary for...
The development of a positioning algorithm on the board of a moving object using the information about the direction of signal reception from global system for mobile base stations. The developed system may be used as the effective and reliable method of positioning. Mobile module can help to solve all the types of positioning problems.
This paper proposes a new Wi-Fi based indoor positioning method that is robust over unstable Wi-Fi access points (APs). Because Wi-Fi based indoor positioning relies on unstable and uncontrollable infrastructure (Wi-Fi APs), the positioning performance significantly decreases when such unstable APs are included in the localization system. This paper proposes a indoor positioning method by employing...
In China, many mobile phone users have become the victim of spam calls and suffered heavy financial loss. Discovering of call spammers can benefit mobile network operators as well as users. In this paper, we propose a time-based graph model and a simple and effective Call Log Rank(CLRank) algorithm with ranking and classification were proposed to find potential call spammers. Experimental results...
With the increasing demand for video streaming in mobile environment, we have been tackling a research on throughput prediction based on the measurement history data in order to improve service quality[1][2]. Since throughput fluctuation occurs sharply in mobile environment, useless packet loss or congestion occurs when available network bandwidth is insufficient compared to the bit rate of video...
Mobile positioning by cellular networks has received growing attention and several researches are carried out to enhance positioning algorithms and techniques that will be able to give better performance at multiple environments (outdoors/indoors). In this paper, we are interested in UTDOA (uplink time difference of arrival) approach to determine the location of a Mobile Station within an acceptable...
Mobile ad hoc networks (MANETs) are wireless networks which have a wide range applications due to their dynamic topologies and easy to deployment. However, such networks are also more vulnerable to attacks compared with traditional wireless networks. Certificate revocation is an effective mechanism for providing network security services. Existing schemes are not well suited for MANETs because of...
The number of applications available since the late 2010's, and the number of smartphone user sharply increasing. However, not all applications are not useful or helpful. In other words, to obtain satisfactory results in the search can be difficult means. Users to find what they want to search for a many times. To solve this problem, previous studies have proposed the use of recommender systems. Most...
We present methods to predict and validate home and work places of anonymized users using their mobile network data. Knowledge of home and work place of a user is essential in order to find his (and overall population) mobility profiles. There are many methods that predict home and work places using GPS data. But unlike GPS data, mobile network data using GSM do not provide the exact location of a...
In mobile ad hoc networks (MANETs), it is effective for mobile nodes to retrieve data items using top-k queries, in which data items are ordered according to a particular attribute score, and the query-issuing node acquires the data items with the k highest scores. However, accurate results may not be acquired in environments where malicious nodes are present. In top-k queries, it is important to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.