The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
5G operators will utilize mobile edge computing (MEC) to shorten transmitting latency and fulfill the requirements of increasing mobile applications for high bandwidth and ultra-low latency. A mobile online system (MOS) supports mobile online applications to trigger events in the mobile devices, refresh data, and maintain data consistency in the clouds. As users run mobile online applications, a MOS...
Understanding the mobile user flow flux patterns is important for numerous applications. Much of the mobility modeling studies have focused on a user-centric approach for outdoors movement. In this study, we take a location-centric approach for indoor mobility to analyze and characterize region relationships as pertains to user flow. Our study is trace-driven, as we use extensive measurements from...
To cope with increasing mobile data traffic, researchers are currently working on traffic offloading techniques for delivering data over unlicensed cellular bands. Current offloading schemes based on offloading data to Wi-Fi regardless Wi-Fi has sufficient throughput or not. Though, we propose a novel offloading technique based on the Remaining Throughput Scheme (RTS) for Wi-Fi selection. In our proposed...
System calls provide an interface to the services made available by an operating system. As a result, any functionality provided by a software application eventually reduces to a set of fixed system calls. Since system calls have been used in literature, to analyze program behavior we made an assumption that analyzing the patterns in calls made by a mobile application would provide us insight into...
To deal with the severe challenge from explosively increasing mobile users' multimedia service requests in mobile networks, introducing cloud-based computing platform and content caching into radio access networks (RANs) has become an effective emerging technique. In this paper, we propose a collaborative hierarchical caching framework in cloud RANs (C-RANs), which minimizes the access delay of content...
Malware, short for malicious software, contuses to morph and change. Traditional anti-virus software may have problems detecting malicious software that have not been seen before. By employing machine learning techniques, one can learn the general behavior patterns of different threat types and use these to detect variants of unknown threats. We have developed a malware detection system based on machine...
In every existed technical tool and specific-purpose application, security must be in watch all the time. Each of these has its security implications that need to be considered specifically in order to protect all users' data and information and prevent putting them at risk. Moreover, the rapid development and spread of many technologies such as mobile networks and smart phones, IoT, smart cities,...
The app repackaging has became one of the most serious problems on Android platform nowadays. In the past, most of studies focus on the code detection, which deals with the billion opcodes, thus time consumption is expensive. Besides, it lacks the resistance to code obfuscation and hardening technology thus accuracy will easily be affected. Recently, UI-based detection was proposed. Some dynamic UI-based...
The advancements of Information and Communications Technologies (ICT) have contributed to an explosive growth of high-volume, high-velocity and high-variety information assets, and the era of Big Data has emerged. The infrastructure-based networks are becoming increasingly overloaded, while the cost of maintaining and expanding the infrastructure to accommodate the Big Data communications remains...
This paper introduces a new lightweight key exchange (KE) protocol which can be suitably implemented on resource-constrained smart devices to protect the privacy of communications in mobile networks. The most attractive features of this new KE protocol are provable security and lightweight. The security of this new KE protocol is based on the known impossibility of finding the unique values for variables...
This study investigates the effectiveness of financial incentives (hereafter, simply incentives) in increasing viewership and social sharing of advertisements. Incentives can, in principle, help advertisers reach a larger audience, but there are two aspects of their application that have yet to receive much attention: (a) How large of an incentive will be needed to engage users with advertisements...
Mobile devices can cause visual discomfort and even injuries to the eyes owing to shaking and vibration. In this study, we aim to develop a real-time visual tracking technique for mobile display stabilization in order to provide users with a comfortable interaction experience and reduce the hurt caused by screen vibration. The workflow of this mechanism includes tracking the motion of the mobile device,...
With the diverse development of mobile applications (apps), mobile devices can provide a wide range of services, this study was to construct and verify the convenience service for customers in chain hotels in terms of mobile commerce. We proposed five service dimensions by customers' perception, included usage convenience, post-benefit convenience, benefit convenience, transaction convenience, and...
In this paper, we present some features of our in-situ indoor-outdoor authoring tool for location-based learning experiences. For example, how to reuse locations in different experiences or how to design from scratch in places without any location sensing mechanisms. In addition, we describe some features in which we are working on. We expect to create a space for discussion about these kind of tools...
App store reviews are currently the main source of information for analyzing different aspects of app development and evolution. However, app users' feedback do not only occur on the app store. In fact, a large quantity of posts about apps are made daily on social media. In this paper, we study how Twitter can provide complementary information to support mobile app development. By analysing a total...
This study reports how senior citizens domesticate their personal mobile devices at the beginning of learning process in an adult education class. The aim of this study was to examine how seniors integrate their mobile devices into their personal education experience, what sort of processes were experienced to render the devices useful and meaningful, and how gender and information literacy influenced...
Using the mobile robot to carry static sensors and deploy sensors at proper positions is an efficient method to solve the sensor deployment problem in wireless sensor networks (WSNs). In this paper, we assume a more practical environment compared to most studies of this problem. The goal of the proposed algorithm is to plan a shorter traveling path for the robot to relocate the redundant sensors in...
Inquiry-based learning is kind of learning activities that involves students' entire capabilities in exploring and investigating particular objects or phenomenon using critical thinking skills. Recently, information technology tangibly contributes in any education aspects, including the existence of e-learning, a widely spreading learning model in the 21st century education. This study aims at initializing...
Mobile app testing is challenging since each test needs to be executed in a variety of operating contexts including heterogeneous devices, various wireless networks, and different locations. Crowdsourcing enables a mobile app testing to be distributed as a crowdsourced task to leverage the crowd in a community. However, a high test quality and expected test context coverage are difficult to achieve...
Location-disclosure is a major privacy issue in vehicular social networks when people are interested in traffic-related cooperation drive, location-aware services, and other applications. In this paper, we propose a Social-aware Location-privacy Protection (SLP) method in vehicular social networks to protect location privacy. This method enables trustworthy users to obfuscate an original sender's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.