The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile phones have been diffusing worldwide at an astonishing rate. They provide individuals with unprecedented connectivity to information and inter-personal interaction, and thus are expected to enhance social capital. This paper sets out to present an investigation focusing on the impact of mobile phone use on individual social capital. Based on the case studies conducted in Australia and South...
The new generation of Intelligent Transportation Systems (ITSs) should be able both to monitor in real-time the current user location and traffic conditions, and to access the heterogeneous data sources maintained by different organisations and useful for ITS applications. For this reason, a layered ITS architecture is proposed, which consists of a Wi-Fi communication layer for data exchange between...
This standard specifies the electronic payment service layer and profile for Payment and Identity authentication, and Payment Data transfer for Dedicated Short Range Communication (DSRC) based applications in Wireless Access in Vehicular Environments. This standard defines a basic level of technical interoperability (vehicle-to-roadside) for electronic payment equipment, i.e., onboard unit (OBU) and...
Taking into consideration the requirements of high speed and efficiency for modern logistics, the system descried in this article establishes a communication mechanism of global mobile logistics for the purpose of realizing the target of high-speed information exchange and processing among manufacturers, logistics enterprises and customers. Focusing on the selection of inventory strategy for logistics...
At present, the number of mobile device users are increasing as a result of many factors such as today's efficiency of mobile data exchange, the collaboration and support from several business services such as bank system, retail marketing, healthcare, emergency service and etc. Emergency situation is a crisis that needs rapid information retrieval in real time from heterogeneous data source. The...
This paper investigates the problem of Partitioning Skew in MapReduce-based system. Our studies with Hadoop, a widely used MapReduce implementation, demonstrate that the presence of partitioning skew causes a huge amount of data transfer during the shuffle phase and leads to significant unfairness on the reduce input among different data nodes. As a result, the applications experience performance...
The lack of interoperability between DRM systems in previous solutions to digital rights management in mobile environment has caused many problems for customers. We proposed here in this paper a solution to realize exchanging digital right information between diverse DRM systems by establishing trust among Right Issuers beforehand to provide a more efficient, convenient and uniform contents interface...
Secure network architecture for an enterprise mobile message exchanging is very important. This paper describes three network architecture scenarios, illustrates each of the secure scenarios by showing what softwares are needed, features and consideration factors, describes varied Setup Type.
Since modern software systems are enormous and complicated, proper abstractions of their structure are essential for better understanding, maintaining and updating these system. In order to create and support such features through generating the architecture levels in the system structure, it is effective to conduct software clustering techniques from the source code. In recent years, mobile systems...
In this paper we present BlueS, a framework for information-service discovery and data exchange in mobile adhoc scenarios. Therefore, its necessary to develop intelligent efficient indexing strategies for knowledge addressing and exchange in dynamic ensembles. Especially in scenarios like MuSAMA, a project dealing with Smart-Rooms, data access, query evaluation on mobile devices and retrieval techniques...
Business-to-business (B2B) partnerships bring a need for a B2B platform as a middle-ground solution that enables the information exchange and interaction between operators' and business partners' applications. The article discusses the market need for communication between partners' applications, classes of exchanged information and topics connected with revenue management, customer-centric and telco-centric...
Mashup combines multiple data sources to form some kind of new services. Using Mashup, service creation becomes more convenient, effective and low-cost with user's participation. In telecommunication industry, mobile Mashup assembles applications and data sources both from Internet and telecom network (here telecom network refers to mobile communication network.), mobile computing device capabilities...
Opportunistic networks represent the emerging pervasive communication paradigm that supports intermittent connectivity scenarios. To develop reliable data exchange and communications both protocols and services can be enhanced exploiting context and content information, defining thus a novel data-centric communication paradigm. In this demo we present a social- aware content sharing service based...
In this paper we propose an algorithm for taxi telematics system. The paper shows how the central call server, call customer, and an empty taxi co-ordinate with one another. With this algorithm, the central call server works efficiently in response to the customer call as well as for an empty taxi. Location history data is required for the central call server to provide a map display of 'needy' customer...
It is evident that mobile devices of the future will have multiple wireless interfaces. For small, energy-constrained devices, determining network availability by keeping all radio interfaces turned on at all times will negatively impact battery lifetime even when these interfaces are idle. Predicting future network availability from user history requires a period of training and learning user habits...
In mobile peer-to-peer networks, it is important to discovery file to increase the file accessibility and to decrease the wireless network traffic. In this paper, we design and evaluate a discovery scheme to effectively search files by using only local information in a mobile peer-to-peer network. Our discovery protocol is based on the concept of peer-to-peer caching of file information advertisement...
We have been studying a service coordination technology that enables users to use the various types of service elements that are available in a ubiquitous computing and networking environment. We have adopted a user context handling mechanism to choose suitable service components for "users." In this paper, we proposed an adaptive information delivery method for personalized recommendation...
Recent evolution of mobile technologies has opened new use possibilities for mobile devices. At the same time information security problems related to mobile devices have gotten more serious. This study investigated a possibility of remotely and securely transferring files between the mobile device and home computer via the Internet, and the information security threats related to this. We constructed...
Mobile IP is used to manage the mobility of the Internet mobile users, and to keep their connectivity while they move from place to place. The security of mobile IP considering can be divided into two aspects, first in registration process, second, when connected parties exchange data with each other. In this article, after a brief study on the existing approaches used for securing mobile IP connections...
A challenge for pervasive computing is the seamless integration of computer support with users' activities in a very dynamic setting, with deep human and resource mobility. Portable devices such as notebooks, PDAs and smartphones are becoming more and more popular, as their computational power increases and their prices fall. Moreover, the quick spread of wireless networks has permitted the exchange...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.