{"title":"Mobility and Fault Aware Adaptive Task Offloading in Heterogeneous Mobile Cloud Environments","authors":"A. Lakhan, Xiaoping Li","doi":"10.4108/eai.3-9-2019.159947","DOIUrl":"https://doi.org/10.4108/eai.3-9-2019.159947","url":null,"abstract":"Nowadays, Mobile Cloud Computing (MCC) has become a predominant prototype for fetching the benefits of cloud computing to mobile devices’ propinquity. Service availability in addition to performance enhancement and mobility features is a preliminary goal in MCC. This paper proposes a mobility aware adaptive offloading framework, known as Mob-Cloud, which includes a mobile device as a thick client, ad-hoc networking, cloudlet DC, and remote cloud services, to augment the performance and availability of the MCC services. However, the impact of dynamic changes in a mobile content (e.g., network status, bandwidth, latency, and location) for the task offloading model observes through proposing a mobility aware adaptive task offloading algorithm (MATOA), which makes a task offloading decision at runtime on selecting optimal wireless network channels and suitable resources for offloading. In this paper, we are formulating the decision problem, and it is well-known as an NP-hard problem. Nonetheless, MATOA has the following phases for the entire Mob-Cloud model: (i) adaptive offloading decision based on real-time information, (ii) workflow task scheduling phase, (iii) mobility model phase to motivate end-user invoke cloud services seamlessly while roaming, and (iv) faulttolerant phase to deal with failure (either network or node). We carry out actual real-life experiments at the implemented instruments to evaluate the overall performance of the MATOA algorithm. Evaluation results prove that MATOA adopts dynamic changes on offloading decision during run-time, and meet an enormous reduction in the total response time with the improved service availability whilst in comparison with the baseline task offloading strategies.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123155853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-CREDND Scheme for Detection of malevolent nodes in Ad-hoc Network","authors":"Shilpi, D. Rizvi","doi":"10.4108/eai.13-7-2018.163971","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.163971","url":null,"abstract":"The remote network that comprises of multipurpose nodes and is infrastructure-less in nature is mobile ad-hoc network (MANET). It powerfully self-composes in subjective and impermanent system topologies. These moveable ad-hoc systems are dishonest and powerless to any interruption in light of their remote association approach. Subsequently, the data from these systems can be stolen effectively just by presenting the aggressor nodes in the system. The hop count metric is calculated to determine the straight route degree. For this reason, directing conventions are arranged. Among all the potential assaults on MANET, identification of wormhole attack is considered to be most problematic. One malevolent node gets packets from a specific area, tunnels them to an alternate transmissible node arranged in another area of the system and deforms the full steering strategy. All routes are merged to the wormhole set up by the aggressors. The total directing framework in MANET gets diverted. Here in this paper, a procedure for identifying malevolent nodes in movable ad-hoc system has been proposed (E-CREDND) and this scheme is critical for the regions where the route separate in the midst of source and goal is two nodes only. This scheme isn't appropriate for those situations where multi-hops are exhibited in the midst of transmitter and recipient. In the anticipated investigation, another procedure is executed for the identification and separation of aggressor sensor nodes from the system. The anticipated plan is used in NS2 and it is portrayed by the propagation results that the anticipated plan demonstrates better execution in correlation with existing methodologies.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115939036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crypto Model of Real-Time Audio Streaming Across Paired Mobile Devices","authors":"E. Ibam, O. Boyinbode, I. O. Ayelabowo","doi":"10.4108/eai.13-7-2018.160978","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.160978","url":null,"abstract":"The progressive usage of the Internet of Things (IoT) and smartphone ubiquity is inducing attention, importance and interest in leveraging smartphones for deploying and running sophisticated mobile applications. Modern smartphones have good connectivity, a significant amount of processing, and are always with us, making them an ideal candidate for envisioned applications that can serve as a means of ensuring the safety and security of mankind. This research aims at developing a real-time audio encryption application between two or more handheld mobile devices, the communication between devices is made secure by encrypting the audio sent in real-time using Advanced Encryption Standard (AES) 256bit encryption key while channelling message through a cloud-hosted database (Firebase) that works as a real-time database and performs implicit AES encryption and decryption on its data. Geocoder from the Google Map API library services is used to track the location of the audio sender.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125831215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anwar Saif, M. Othman, Ibrahim Alsurmi, Mukhtar Ghilan, Al-Gabri Malek
{"title":"CBA-TCP: A cross-layer TCP transmission rate adaptation scheme based on the compressed block ACK bitmap of IEEE 802.11n networks","authors":"Anwar Saif, M. Othman, Ibrahim Alsurmi, Mukhtar Ghilan, Al-Gabri Malek","doi":"10.4108/eai.31-1-2019.162735","DOIUrl":"https://doi.org/10.4108/eai.31-1-2019.162735","url":null,"abstract":"Optimizing the performance of TCP in wireless networks in a changing network condition is a highly challenging issue. The lack of information at the TCP layer about the link quality will result in inaccurate transmission rate. Therefore, TCP needs to have sufficient information about the environment and the different characteristics of the lower layers to improve the performance. To achieve this goal we proposed a cross-layer scheme which makes use of the information stored in the 802.11n compressed block acknowledged bitmap about the status of the transmitted subframes of the aggregated frame. This information is fed to the TCP transmission mechanism as a new criterion to adjust the TCP transmission rate with accordance to the aggregation level and channel quality. The simulation results show that the proposed scheme improves the TCP performance in term of throughput and packet loss.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131778317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LDPC encoding performances for fading suppression in MIMO-CDMA wireless networks","authors":"Ioana M. Marcu, C. Voicu, S. Halunga, R. Preda","doi":"10.4108/eai.10-7-2018.155052","DOIUrl":"https://doi.org/10.4108/eai.10-7-2018.155052","url":null,"abstract":"In multiuser wireless communication systems, signal recovery, even at low BER is a relevant factor for ensuring a safe and reliable communication. Efforts for interference minimization include multiple analysis of source coding/decoding techniques, channel coding/decoding techniques and multiuser detection algorithms. This paper illustrates the improvement brought by LDPC technique in SS systems when AWGN and Rayleigh/Nakagami-m fading occur on communication channel. Performances are evaluated for different sets of spreading sequences (Walsh-Hadamard, Kasami and PN) and based on the simulation results several conclusions are highlighted and further improvement will be proposed for fading effects reduction and interference minimization.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132674459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jawad Ali, Muhammad Shoaib Shoukat, Muhammad Faisal
{"title":"Determining Interdependencies among NFRs in Agile Environment to Reduce Conflicts","authors":"Jawad Ali, Muhammad Shoaib Shoukat, Muhammad Faisal","doi":"10.4108/eai.22-3-2018.154384","DOIUrl":"https://doi.org/10.4108/eai.22-3-2018.154384","url":null,"abstract":"NFRs play a very key role in the development of high quality software. As NFRs are quality attributes of the software system, so it must be dealt properly and with care in the early phases of software development otherwise it will lead the system to failure or dismissal of quality requirement at later phases. NFRs have a very unique ability to conflict and contradict among themselves. And the main reason behind this ability of NFRs is interdependency, which should be found and dealt properly in order to avoid requirement dismissal. Agile methodologies only focus on functional requirements but neglects non-functional requirements. In this work, we identified and highlighted all the possible dependencies between different NFRs in agile environment. In addition we also proposed a specific framework to cope up with the identified dependencies between NFRs.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115267953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Expert System for Handling Congestion in Opportunistic Network","authors":"Ahthasham Sajid, Khalid Hussain","doi":"10.4108/eai.22-3-2018.154386","DOIUrl":"https://doi.org/10.4108/eai.22-3-2018.154386","url":null,"abstract":"Opportunistic networks are one of the most popular categories of mobile Adhoc networks. These types of networks usually have to deal with intermittent disconnected path from source to the destination most of the time therefor suffers from numerous key challenges for successful custody transfer to be done between encounter nodes. There are numerous challenges faced due to such disconnectivity within the network but one of the key challenges is that which intermediate node will be selected as custody transfer and till how much time custodian node can carry messages as it will have storage constraints until a destination node is found. In this research study the same problem has been addressed via proposing a rule based expert system that will have better coordination among intermediate nodes for the transmission with less drop and better delivery ratio. Proposed technique has been tested and validated via ONE simulator and compared with MaxProp protocol.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sahrish Khan Tayyaba, Adnan Akhunzada, Noor Ul Amin, M. A. Shah, Faheem Khan, Ihsan Ali
{"title":"NPRA: Novel Policy Framework for Resource Allocation in 5G Software Defined Networks","authors":"Sahrish Khan Tayyaba, Adnan Akhunzada, Noor Ul Amin, M. A. Shah, Faheem Khan, Ihsan Ali","doi":"10.4108/eai.22-3-2018.154387","DOIUrl":"https://doi.org/10.4108/eai.22-3-2018.154387","url":null,"abstract":"In cellular networks, physical resources are always limited, especially when shared among different contributors such as mobile network operator (MNO) or mobile virtual network operators (MVNO) etc. Software Defined Network (SDN) and Network Function Virtualization (NFV) is a Current research area. SDN-based cellular networks provide high Quality of Services (QoS) to the end-user and NFV provides isolation. The sharing of resources is often provided by leveraging virtualization. SDN can generate new forwarding rules and policies for dynamic routing decision based on the traffic classification. However, virtualization in cellular networks is still in infancy and many issues and challenges remain unaddressed. The queue-length problem for providing QoS is cellular network requires attention. The queue management requires separate management protocols for fair allocation of resources. In this research paper, we propose a novel framework for resource allocation and bandwidth management in the 5G cellular network. We are using two level of virtualization, i.e., implementing dynamic resource optimization at network slice manager and executing optimized policies at the wireless virtual manager.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122236488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of Congestion Control Model on Congested Traffic Flow in Vehicular Ad Hoc Networks (VANETs)","authors":"A.A.K. Azameti, F. Katsriku, P. Chong, J. Abdulai","doi":"10.4108/eai.22-3-2018.154371","DOIUrl":"https://doi.org/10.4108/eai.22-3-2018.154371","url":null,"abstract":"","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126287987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Khan, I. Qureshi, Syed Bilal Hussain Shah, M. Akhlaq, Alamgir Safi, Muhammad Asghar Khan, Anjum Nazir
{"title":"Comparative Analysis and Route Optimization of State of the Art Routing Protocols","authors":"I. Khan, I. Qureshi, Syed Bilal Hussain Shah, M. Akhlaq, Alamgir Safi, Muhammad Asghar Khan, Anjum Nazir","doi":"10.4108/eai.22-3-2018.154385","DOIUrl":"https://doi.org/10.4108/eai.22-3-2018.154385","url":null,"abstract":"Performance of any network is based on the routing protocols. RIP, Session, OSPF and BGP are the few commonly used dynamic routing protocols used in today’s networks. Routing refers to the phenomenon of selecting the best available path to forward packets to its destination. It is a core feature for any network because the performance of the networks heavily depends upon it. In this paper we will perform comparative analysis by using Distance Vector, Link State and Session routing protocol. We will study Packet drop rate (PDR), Bandwidth / Link Utilization, End to End Delay, throughput behavior of these protocols by using network simulator 2 (ns2) for route optimization & comparative analysis to find optimal routing protocol","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"345 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116316054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}