The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Founded in 2005 YouTube has became the most fast growing stream service, that has a great impact on the internet traffic distribution. Thus understanding YouTube's characteristics is crucial to network providers. In this survey we are going to present the factors that impact user's satisfaction, in other meaning the impact on the Quality of experience(QoE). Furthermore we will discuss how to determine...
In the pretext of digital lifestyle in a Smart City, home security has become a prudent yet technically challenging area for players of this field. Home access system is a part of home security. In this paper, we present a smart locking and unlocking system for home door security. The proposed system controls the door lock through an Android App using Wi-Fi as the communication protocol, that communicates...
Mobile cloud computing paradigm enables cloud servers to extend the limited hardware resources of mobile devices improving availability and reliability of the services provided. Consequently, private, financial, business and critical data pass through wireless access media exposed to malicious attacks. Mobile cloud infrastructure requires new security mechanisms, at the same time as offloading operations...
Network Function Virtualization (NFV) is a promising solution for telecom operators and service providers to improve business agility, by enabling a fast deployment of new services, and by making it possible for them to cope with the increasing traffic volume and service demand. NFV enables virtualization of network functions that can be deployed as virtual machines on general purpose server hardware...
Mobile applications are usually developed in a native way, using languages and APIs specific for a given platform, hindering the portability. As an alternative, web technologies as JavaScript and PHP have been employed enabling a same implementation to be executed in different mobile platforms without any recompilation or recoding process. This paper compares the efficiency of Android applications...
In recent times, mobile broadband networks are focused on bringing different capabilities to the edge of the mobile network. Mobile Edge Computing (MEC) addresses this issue by placing the compute and storage resources closer to the Radio Access Network (RAN), with an aim to reduce end-to-end latency, ensure better service delivery, and offer improved user experience. In this work, we propose SDEC...
Recently, mobile broadband networks are focused on bringing additional capabilities to the network edge. For instance, Mobile Edge Computing (MEC) brings storage and processing capabilities closer to the mobile user i.e., at the radio access network, in order to deploy services with minimum delay. In this paper, we propose a resource constrained cloud-enabled small cell that includes a MEC server...
Mobile devices have been helping to empower underserved communities around the world. From bringing information on health and farming to substituting expensive devices, cellular phones and apps have proved to be powerful tools in poverty alleviation and disaster relief. The Mobile Lab at Santa Clara University focuses on developing mobile solutions for social benefit and, in this paper, we describe...
Mobile medical applications are increasingly being used by patients and consumers. However, due to their complexity, these applications are normally only accessible to smartphone users. People using low-end cellphones cannot benefit from this new technology. The goal of this paper is to expand health service platform to lower-end cellphones, so that people in underdeveloped regions can benefit from...
We consider a mobile-CDN system where base stations (BSs) are equipped with storage for replicating and distributing content. In such a system, BSs cooperation in replying user requests is a widely adopted mechanism. For such cooperative caching, a key issue is the joint optimization of content placement and request redirection, which has been intensively investigated in the literature. However, optimizing...
The latest approaches for flexible assembly and process-integrated quality control of large components require global metrologic reference systems for various tasks, e.g. navigation of mobile transport units, control of cooperating robots or local inspection with handheld devices. While cooperative and competitive approaches for data fusion of multi-sensor metrologic systems already exist, a reference...
This study aims to design a web technology based Emergency System (SmartER) system, which will enable the doctors and nurses to perform the patient related procedures more quickly and smoothly in the emergency departments. SmartER is not just software, it is planned as a system that includes a monitor screen to be mounted on the wall, a barcode bracelet for the patients, mobile devices to be used...
With the rapid development of the Internet, especially in recent years, the development of mobile Internet is increasingly rapid. Message push, which is an important way for mobile client to publish information and make communication, plays a significant role in mobile Internet. MQTT protocol is one of the implementation technologies of message push in Android system with low power consumption and...
In this paper, we propose a Mobile Crowd Sensing application based on Community Information-Centric Networking to collect opportunistic sensing data in limited area where it restricts radius of Bluetooth Low Energy beacon. The application has more valuable features by comparing with common Mobile Crowd Sensing one. First is to support data integrity and utilize simple communication model according...
QoS of applications in an edge node of mobile edge computing (MEC) could degrade due to congestion of wireless access or short of mobile edge computing resource. In order to improve QoS such as TCP throughput, we propose a VM migration method, which takes a VM from congested node to another node in a mobile edge. Users can choose a far but less-congested node, instead of a near but congested node...
We propose a privacy preserving mobile advertising system for in-app ad placement, that enables user profiling and targeted ads without revealing user interests to the mobile advertising companies. Our proposal relies on device-based user profiles, derived from app activity, on the use of Private Information Retrieval (PIR) to query ads database(s) for matching (to profile) ads, without the database(s)...
To cope with the varying delay and bandwidth requirements of today’s mobile applications, mobile wireless networks can profit from classifying and predicting mobile application traffic. State-of-the-art traffic classification approaches have various disadvantages: port-based classification methods can be circumvented by choosing non-standard ports, protocol fingerprinting can be confused...
The twenty most visited museums in Italy (over the total number of 4.976) attract one third of the entire visitors population. This results into a small number of very famous overcrowded museums (with an average waiting time of two hours) and a myriad of still beautiful but empty museums. In order to reduce the queuing time outside one of those famous museums, we have been asked to produce a mobile...
As servers are equipped with more memory modules each with larger capacity, main-memory systems are now the second highest energy-consuming component in big-memory servers and their energy consumption even becomes comparable to processors in some servers. Meanwhile, it is critical for big-memory servers and their main-memory systems to offer high energy efficiency. Prior work exploited mobile LPDDR...
Vehicle-to-vehicle (V2V) communication technology based on Wi-Fi technology has recently been used to prevent vehicles from colliding with each other. However, in V2V communications, radio waves cannot be diffracted well enough at intersections at which vehicles cannot detect each other. Therefore, such technology might not prevent traffic accidents from occurring. In this study, we used mobile networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.