The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Needs of new services and complexity of network are increasing rapidly nowadays. To resolve this states, this paper aim to implement VNF (Virtualized Network Function), which operates on the open network platform. And VNF is implemented based on existing open source. Especially, this paper focus on AP (Access Point) control using CoovaChilli. Also, it aims at perfect openness by contributing the open...
In the last decade we have witnessed the birth and dramatic growth of mobile devices, from cellular-to smart-phones. Despite the huge amount of information achievable from an always-connected reality, researchers that work in the mobile devices field fight against the impossibility to explore, inspect and test their work on such a vast set of possible environments, use case scenarios, hardware and...
This paper presents the results of an indoor localization experiment that uses spread spectrum modulated audio signals. Indoor spaces do not have line-of-sight to global navigation satellite systems and do not have a truly universal localization system to allow mobile devices to localize themselves. Previous approaches focused in using custom made hardware with several types of signals that, even...
A well-known proverb says “If it looks like a duck, walks like a duck and quacks like a duck, it is a duck”. This statement raises an interesting approach to identifying counterfeit mobile devices. If we substitute the “duck” for a device and map the proverb to the following characteristics of a device, we can use the proverb to help validate if a device is counterfeit: 1) Looks like a duck: user...
Mobile devices dominate a majority of our business and private life. The increasing number of apps and powerful hardware ensure high demand and a growing usage rate. Based on the device sizes, the space for hardware is limited and this fact impacts battery size and, therefore, battery life. Mobile phone vendors look for ways to increase battery life through hardware and software features. This paper...
With the aim of illuminating factors that promote or inhibit integration of MALL into taught ESFL programs, and the benefits of such integration, the current study reports findings from an online survey of 70 researchers who conducted studies in this area between 1994 and 2012. Results reveal a rich range of factors, both facilitating and inhibitory, from the institutional down to the teacher, the...
We present a wearable system that uses ambient electromagnetic interference (EMI) as a signature to identify electronic devices and support proxemic interaction. We designed a low cost tool, called EMI Spy, and a software environment for rapid deployment and evaluation of ambient EMI-based interactive infrastructure. EMI Spy captures electromagnetic interference and delivers the signal to a user;s...
As the number of smart device users has increased, PC-based smart work environments of businesses and public institutions have opted to adopt mobile offices to support their employees. However, with the trend of BYOD (Bring Your Own Device), security problems such as the leaking of confidential information of businesses and important contents have also developed. Thus, the paper proposes utilization...
Capabilities of the devices installed in a smart home are often fully accessible only to qualified integrators. As the users become more interested in setting up their home automation devices by their own, there is a need to bridge the gap between the magnitude of possibilities offered by home automation devices and the limitations of the methods accessible to the user. This paper proposes an event-based...
In this work, we present a brief report on a pilot project based on the concepts of Mobile Remote Experimentation (MRE). The project aims to provide an environment and a model using open source tools that can be replicated, since these are likely to re-use and have low cost, essential factors when it comes to public education, that allows students to perform laboratory practices remotely via mobile...
The article describes an online laboratory for a wide range of automated control systems researches with video stream in real time. The online laboratory, based on a DC motor, is an open source, suitable for modern mobile devices and it also does not require additional client software.
This article presents an alternative architechture implementation with the purpose of provide real experiments of remote access and expand teaching practices focused on experimentation toward physics education. The research uses a low cost open hardware and an available multiplatform with open source applications. With this initiative, lab resources can be accessed from schools, as many of them have...
Quality attributes are essential in software architecture and they are determined by identifying the concerns of the stakeholders of a system. The concerns of constructing mobile applications (apps) are quite specific due to the characteristics of mobile devices. These concerns have not been adequately addressed in industry standards and practices. In this paper, we present a mobile app development...
One of the most important aspects in the development of a city is the educational aspect. The quality of a good education sector in the city will also affect the quality of the city. The quality of education is also supported by a variety of factors, one of which is the school. Generally, people will be looking for good schools and proximity to the neighborhood. So that people can easily get the desired...
Mobile devices have been pervading many aspects of our lives, including applications that are critical and deal with sensitive data. Together with existing features, designers are required to add cryptographic primitives capable of guaranteeing privacy of the users and security of the operations. However, for pervasive mobile devices, the simple addition of cryptographic capabilities is not sufficient...
Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of...
The I/O caused by background applications shorten the lifespan of mobile devices because they affect the behavior of power intensive hardware. Our efficient power management scheme addresses this problem by killing unnecessary applications. Our results show LPK extends the lifespan up to 9.4% compared to baseline on a real device.
Smartphones have become powerful computing systems able to carry out complex tasks, such as web browsing, image processing and gaming, among others. Graphics animation applications such as 3D games represent a large percentage of downloaded applications for mobile devices and the trend is towards more complex and realistic scenes with accurate 3D physics simulations, like those in laptops and desktops...
This paper describes the design and implementation of a sustainable travel assistance system consisting of a two wheeler mounted portable USB charger named Winger. This uses renewable wind energy to charge any cellular phone. It also introduces a travel analysis system along with a proposed system based on user speed profiling analogous to the concept of collaborative filtering. The focus of this...
For mobile devices, battery energy is the most precious resource. In the last decade, researchers have proposed various energy saving strategies from the system level to the hardware component level. In this paper, we explore how close to one week a smart phone running off of a single battery can last under normal usage. We first developed a battery lifetime prediction model that considers the influence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.