The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-defined networking and mobile edge caching are promising technologies in next generation mobile networks. This paper proposes to jointly optimize bandwidth provisioning and caching strategies in software-defined mobile networks considering the quality of services and limitations of resources. The proposed scheme aims at maximizing gains from dynamically managing caches and efficiently utilizing...
Mobile edge computing (MEC) has risen as a promising technology to augment computational capabilities of mobile devices. Meanwhile, in-network caching has become a natural trend of the solution of handling exponentially increasing Internet traffic. The important issues in these two networking paradigms are computation offloading and content caching strategies, respectively. In order to jointly tackle...
The Network Functions Virtualization (NFV) paradigm is undoubtedly a key technological advancement in the Information and Communication Technology (ICT) community, especially for the upcoming 5G network design. While most of its promise is quite straightforward, the implied reduction of the power consumption/carbon footprint is still debatable, and not in line with the energy efficiency perspective...
Internet of Things (IoT) applications consist of diverse Things (sensors and devices) in terms of hardware resources. Furthermore, such applications are characterized by the Things' mobility and multiple interaction types, such as synchronous, asynchronous, and streaming. Middleware IoT protocols consider the above limitations and support the development of effective applications by providing several...
Crowd-sourcing the resources of mobile devices is a hot topic of research given the game-changing applications it may enable. In this paper we study the feasibility of using edge-clouds of mobile devices to reduce the load in traditional WiFi infrastructures for video dissemination applications. For this purpose, we designed and implemented a mobile application for video dissemination in sport venues...
On functional requirements of atmospheric particle monitoring system, this paper designs a distributed atmospheric particle monitoring system. The proposed system consists of a data acquisition network, embedded gateways, a database server and remote monitoring terminals. The data acquisition network consists of mobile data acquisition nodes and router nodes distributed in monitoring areas which are...
Network Function Virtualization (NFV) is enabling the softwarization of traditional network services, commonly deployed in dedicated hardware, into generic hardware in form of Virtual Network Functions (VNFs), which can be located flexibly in the network. However, network load balancing can be critical for an ordered sequence of VNFs, also known as Service Function Chains (SFCs), a common cloud and...
The mobile and wireless networks used extensively by Internet of Things devices, are becoming more popular for data transfer between Cyber-Physical Systems. These are accessed through mobile applications installed on mobile devices, with various operating systems. The paper is presenting a Cyber Physical Systems Oriented platform for mobile transactions, with applications in remote services access...
Cloudlet based network provides a platform to offloading the traffic workload generated by mobile devices. It can significantly reduce the access delay for mobile application users. However, the high dynamic mobility of users brings significant challenges to the service provisioning for mobile applications, especially for the delay-sensitive big data applications. To increase the overall admitted...
Network Function Virtualization (NFV) is a new paradigm, enabling service innovation through virtualization of traditional network functions located flexibly in the network in form of Virtual Network Functions (VNFs). Since VNFs can only be placed onto servers located in networked data centers, which is the NFV's salient feature, the traffic directed to these data center areas has significant impact...
Users trying to access censored content may experience different results, depending on the technique adopted to enforce Internet Censorship, that in turn depends on different factors. Administrative control of the network (i.e. the entity managing network devices) is one of such factors. To the best of our knowledge, we are the first to focus on censorship detection on 3G/4G (hereafter mobile) network...
Paper describes some aspects of data processing in mobile heart monitoring systems. Authors highlight an important cardiological and social problem of arrhythmic pathologies of the heart and the possibilities of new medical equipment to detect the arrythmia. The architecture and the features of up-to-date monitoring systems are investigated. The specificity of long term ECG records is examined via...
Wireless video surveillance is an important option suitable when it is difficult to have cable Internet and electricity infrastructure, which is the case, for example, for construction yards or vehicles. We present iCam, an open-source Internet-enabled video surveillance project, in which we use mainly discarded camera phones. The mobile application is written mainly in Python on most phone platforms,...
In this demo, we demonstrate the integration of radio access network (RAN)/Software-Defined Networking (SDN) controller with a connectivity management platform designed for mobile wireless networks. This is an architecture designed throughout the EU Celtic-Plus project SIGMONA1. OpenDaylight based RAN/SDN controller and the application server are capable of collecting infrastructure and client related...
Context. Mobile web apps represent a large share of the Internet today. However, they still lag behind native apps in terms of user experience. Progressive Web Apps (PWAs) are a new technology introduced by Google that aims at bridging this gap, with a set of APIs known as service workers at its core. Goal. In this paper, we present an empirical study that evaluates the impact of service workers on...
Short Message Service (SMS) is one of the most popular services in the Global System for Mobile (GSM) and many challenges for security arise from the development of message transmission among the broadband network. Recently, an interesting technique called signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented, with better...
Many different technologies fostering and supporting distributed and decentralized computing scenarios emerged recently. Edge computing provides the necessary on-demand computing power for Internet-of-Things (IoT) devices where it is needed. Computing power is moved closer to the consumer, with the effect of reducing latency and increasing fail-safety due to absent centralized structures. This is...
Most people refer to modern mobile and wireless ubiquitous solutions as an IoT application. The advances of the technology and establishment of cloud-based systems emerge the idea of the connected world over Internet based on distributed processing sites. In this paper, we discuss the dew computing architectural approach for IoT solutions and give an organizational overview of the dew server and its...
Mobile Cloud Computing (MCC) extends cloud services to the resource-constrained mobile devices. Compute-intensive mobile applications can be augmented using cloud either in client/server model or through cyber foraging. However, long or permanent network disconnections due to user mobility increase the execution time and in certain cases refrain the mobile devices from getting response back for the...
The next generation ubiquitous wireless networks will comprise of mobile users moving between heterogeneous networks with terminals having multiple access interfaces and services. Vertical handover techniques deal with the scenario where a user seamlessly moves between different network access technologies. The most crucial issue in such environment is seamless connectivity. Earlier works demand for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.