The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices are gaining impact in last few years due to their versatility of platform to run various types of applications. Over the years, the storage of mobile devices is increased but still it cannot fulfill all users requirements. Most of the times, users faced limited memory issues on mobile devices, therefore to free up space users often delete files abruptly without considering the usage...
Recently, commutating resource is playing an increasingly more important role in the user experience and future generation wireless networks, as exemplified by the recent progress in mobile edge computing (MEC) and cloud radio access networks (C-RAN). In this paper, by taking advantage of both C-RAN and MEC, we propose a novel mobile cloud-radio access network (MC-RAN) structure, which is composed...
Call detail records (CDRs) collected at telecommunication networks have been well studied to reveal human behaviors such as voice service usage, contact regularities and mobility patterns. With the advances in big data technology, carriers can now collect, store and analyze more data, such as records of user mobile web activities, at scales much larger than CDRs. In this paper, we study 14 features...
Human mobility analysis and modeling is a very interdisciplinary field of research. Mobility models play an important role particularly in assessing the simulative performance of mobile and opportunistic networks. The mobility traces, which most of these models are based on, however, mostly suffer from several shortcomings. In this paper, we use the extensive Lausanne Data Collection Campaign (LDCC)...
Localization is a highly important topic in wireless sensor networks as well as in many Internet of Things applications. Many current localization algorithms are based on the Sequential Monte Carlo Localization method (MCL), the accuracy of which is bounded by the radio range. High computational complexity in the sampling step is another issue of these approaches. We present Tri-MCL which significantly...
Cyber-attacks in mobile tactical networks are increasingly being recognized as a threat to mission assurance and tactical capability. Some recent cyber-attacks have exploited short-range radio communication such as Bluetooth to propagate malware, thereby circumventing traditional cyber network defenses and evading detection. The spread of such self-propagating malware in mobile tactical networks is...
Nowadays, mobile apps penetrate in every aspect of our daily life, due to the proliferation of mobile devices, the constant advances in mobile computing, and the enormous leaps of mobile HCI. Thus, these factors have increased the demands to adopt the mobile ERP as a working model in enterprises. Regardless of these demands, mobile ERP has several challenges and issues that need to be addressed through...
Epidemic routing is considered useful for wireless mobile sensor networks where infrastructure support is limited and sensed information has to be disseminated in a timely manner. The relaying overhead of epidemic routing, however, needs to be reduced to conserve energy. In this paper, we study a new problem: what is a good strategy in epidemic routing to self-stop forwarding a message when a certain...
Energy efficiency is of profound importance for prospective 5G wireless networks, especially in sparsely populated rural areas where broadband mobile services should be provided at a reasonable cost. In this paper the impact of beamforming (BF) and cell discontinuous transmission (cell DTX) technologies on the average area power consumption is studied. The required density of base stations for a 5G...
Characterizing mobile traffic is important to network operators from a network performance and security standpoint. In many cases, such as a performance degradation or security threat, it is useful to know that traffic is being generated by a specific mobile application. Recent methods for identifying mobile traffic have relied on computationally expensive detailed inspection of HTTP flows which may...
To address the mobile data growth challenges, mobile operators need to access more spectrum resources. LTE in unlicensed spectrum (LTE-U) has been proposed to extend the usual operation of LTE in licensed spectrum to cover also unlicensed spectrum, mainly at 5 GHz band due to its wide spectrum availability. However, this extension poses significant challenges especially regarding the coexistence between...
In this paper, we revisit the radio network energy performance evaluation methodology, commonly known as E3F, that was developed in the European EARTH project during 2010–2011. We propose updates to the large-scale deployment and long-term traffic models in order to reflect the situation in a 5G time frame, and also an improvement in the sense that the baseline network is dimensioned to exactly meet...
This research study mainly focused on the research of the application of cloud computing and mobile computing in the in E-learning environment. The objectives of this research paper are 1) to identify advantages and disadvantages associated with running cloud based applications on mobile devices, especially in the area learning. 2) to evaluate the performance and features that can expect from the...
In this paper, the balance of energy-reliability trade off is considered with respect to hybrid multicast routing for self organized MANETs (Mobile Ad Hoc Networks) applications. Our scheme Reliable and Energy Efficient Hybrid Multicast Routing Protocol (REHMRP) operates in the following phases. (1) Computation of Node Remaining Energy (NRE) and power level by applying designed energy model. (2) Determining...
Wearable technology has become mainstream in this information age, it is needed to understand how the potential users of this emerging technology gain value from the innovation of the technology, consequently increasing users' diffusion. Extant literature on the acceptance of mobile computing has been developing such as in mobile banking services and in healthcare service, however, the study of users'...
This paper presents the study of the Hierarchical Distance-Vector Geo-Routing (HDVG) protocol for Mobile Ad-Hoc Networks (MANETs) using NS-3 simulator. The criteria for selection of simulation environment are described. The distributed computing technique for NS-3 simulator is proposed. Simulation results show that HDVG, in general case, outperforms well-known routing protocols OLSR, AODV and GPRS.
Customer churn analysis is getting immense attention from the business community, especially in the telecommunication sector, to help in generating more revenue. This raises the need for modeling a churn prediction system that is not only accurate but also encompasses comprehensibility and justifiability. Also the judgment ability of the domain expert to identify the drivers of churn and determine...
This paper discusses the time-constrained data delivery problem in vehicular ad hoc networks (VANETs). The unique characteristics of the network present great challenges to the issue. First, there are no always-connected forwarding routes between vehicles. Second, there is an intrinsic tradeoff between communication cost and delivery quality. Third, there is great uncertainty about vehicular mobilities...
Software architectures define the overall structure of software systems as composition of interacting components connecting through connectors. As the foundation to the development of software systems, the correctness of the software architecture is critical to the quality of the final product. Formally modeling and analyzing software architectures is an effective way to ensure the correctness of...
Position information of vehicles is a vital requirement in most VANETs (Vehicular ad hoc networks) applications. Thus, positioning is one of the critical issues in VANETs. The existing vehicle localization schemes only consider static estimating problem, while little or no attention is paid to the effect of vehicle movement on localization performance. In this paper, we propose a real-timely vehicle...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.