EAI Endorsed Trans. Mob. Commun. Appl.最新文献

筛选
英文 中文
Mobility and Fault Aware Adaptive Task Offloading in Heterogeneous Mobile Cloud Environments 异构移动云环境下的移动性和故障感知自适应任务卸载
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2019-01-31 DOI: 10.4108/eai.3-9-2019.159947
A. Lakhan, Xiaoping Li
{"title":"Mobility and Fault Aware Adaptive Task Offloading in Heterogeneous Mobile Cloud Environments","authors":"A. Lakhan, Xiaoping Li","doi":"10.4108/eai.3-9-2019.159947","DOIUrl":"https://doi.org/10.4108/eai.3-9-2019.159947","url":null,"abstract":"Nowadays, Mobile Cloud Computing (MCC) has become a predominant prototype for fetching the benefits of cloud computing to mobile devices’ propinquity. Service availability in addition to performance enhancement and mobility features is a preliminary goal in MCC. This paper proposes a mobility aware adaptive offloading framework, known as Mob-Cloud, which includes a mobile device as a thick client, ad-hoc networking, cloudlet DC, and remote cloud services, to augment the performance and availability of the MCC services. However, the impact of dynamic changes in a mobile content (e.g., network status, bandwidth, latency, and location) for the task offloading model observes through proposing a mobility aware adaptive task offloading algorithm (MATOA), which makes a task offloading decision at runtime on selecting optimal wireless network channels and suitable resources for offloading. In this paper, we are formulating the decision problem, and it is well-known as an NP-hard problem. Nonetheless, MATOA has the following phases for the entire Mob-Cloud model: (i) adaptive offloading decision based on real-time information, (ii) workflow task scheduling phase, (iii) mobility model phase to motivate end-user invoke cloud services seamlessly while roaming, and (iv) faulttolerant phase to deal with failure (either network or node). We carry out actual real-life experiments at the implemented instruments to evaluate the overall performance of the MATOA algorithm. Evaluation results prove that MATOA adopts dynamic changes on offloading decision during run-time, and meet an enormous reduction in the total response time with the improved service availability whilst in comparison with the baseline task offloading strategies.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123155853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
E-CREDND Scheme for Detection of malevolent nodes in Ad-hoc Network Ad-hoc网络中恶意节点检测的E-CREDND方案
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2018-07-13 DOI: 10.4108/eai.13-7-2018.163971
Shilpi, D. Rizvi
{"title":"E-CREDND Scheme for Detection of malevolent nodes in Ad-hoc Network","authors":"Shilpi, D. Rizvi","doi":"10.4108/eai.13-7-2018.163971","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.163971","url":null,"abstract":"The remote network that comprises of multipurpose nodes and is infrastructure-less in nature is mobile ad-hoc network (MANET). It powerfully self-composes in subjective and impermanent system topologies. These moveable ad-hoc systems are dishonest and powerless to any interruption in light of their remote association approach. Subsequently, the data from these systems can be stolen effectively just by presenting the aggressor nodes in the system. The hop count metric is calculated to determine the straight route degree. For this reason, directing conventions are arranged. Among all the potential assaults on MANET, identification of wormhole attack is considered to be most problematic. One malevolent node gets packets from a specific area, tunnels them to an alternate transmissible node arranged in another area of the system and deforms the full steering strategy. All routes are merged to the wormhole set up by the aggressors. The total directing framework in MANET gets diverted. Here in this paper, a procedure for identifying malevolent nodes in movable ad-hoc system has been proposed (E-CREDND) and this scheme is critical for the regions where the route separate in the midst of source and goal is two nodes only. This scheme isn't appropriate for those situations where multi-hops are exhibited in the midst of transmitter and recipient. In the anticipated investigation, another procedure is executed for the identification and separation of aggressor sensor nodes from the system. The anticipated plan is used in NS2 and it is portrayed by the propagation results that the anticipated plan demonstrates better execution in correlation with existing methodologies.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115939036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crypto Model of Real-Time Audio Streaming Across Paired Mobile Devices 跨配对移动设备的实时音频流加密模型
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2018-07-13 DOI: 10.4108/eai.13-7-2018.160978
E. Ibam, O. Boyinbode, I. O. Ayelabowo
{"title":"Crypto Model of Real-Time Audio Streaming Across Paired Mobile Devices","authors":"E. Ibam, O. Boyinbode, I. O. Ayelabowo","doi":"10.4108/eai.13-7-2018.160978","DOIUrl":"https://doi.org/10.4108/eai.13-7-2018.160978","url":null,"abstract":"The progressive usage of the Internet of Things (IoT) and smartphone ubiquity is inducing attention, importance and interest in leveraging smartphones for deploying and running sophisticated mobile applications. Modern smartphones have good connectivity, a significant amount of processing, and are always with us, making them an ideal candidate for envisioned applications that can serve as a means of ensuring the safety and security of mankind. This research aims at developing a real-time audio encryption application between two or more handheld mobile devices, the communication between devices is made secure by encrypting the audio sent in real-time using Advanced Encryption Standard (AES) 256bit encryption key while channelling message through a cloud-hosted database (Firebase) that works as a real-time database and performs implicit AES encryption and decryption on its data. Geocoder from the Google Map API library services is used to track the location of the audio sender.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125831215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CBA-TCP: A cross-layer TCP transmission rate adaptation scheme based on the compressed block ACK bitmap of IEEE 802.11n networks CBA-TCP:基于IEEE 802.11n网络压缩块ACK位图的跨层TCP传输速率适配方案
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2018-07-13 DOI: 10.4108/eai.31-1-2019.162735
Anwar Saif, M. Othman, Ibrahim Alsurmi, Mukhtar Ghilan, Al-Gabri Malek
{"title":"CBA-TCP: A cross-layer TCP transmission rate adaptation scheme based on the compressed block ACK bitmap of IEEE 802.11n networks","authors":"Anwar Saif, M. Othman, Ibrahim Alsurmi, Mukhtar Ghilan, Al-Gabri Malek","doi":"10.4108/eai.31-1-2019.162735","DOIUrl":"https://doi.org/10.4108/eai.31-1-2019.162735","url":null,"abstract":"Optimizing the performance of TCP in wireless networks in a changing network condition is a highly challenging issue. The lack of information at the TCP layer about the link quality will result in inaccurate transmission rate. Therefore, TCP needs to have sufficient information about the environment and the different characteristics of the lower layers to improve the performance. To achieve this goal we proposed a cross-layer scheme which makes use of the information stored in the 802.11n compressed block acknowledged bitmap about the status of the transmitted subframes of the aggregated frame. This information is fed to the TCP transmission mechanism as a new criterion to adjust the TCP transmission rate with accordance to the aggregation level and channel quality. The simulation results show that the proposed scheme improves the TCP performance in term of throughput and packet loss.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131778317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LDPC encoding performances for fading suppression in MIMO-CDMA wireless networks MIMO-CDMA无线网络中LDPC编码的衰落抑制性能
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2018-07-10 DOI: 10.4108/eai.10-7-2018.155052
Ioana M. Marcu, C. Voicu, S. Halunga, R. Preda
{"title":"LDPC encoding performances for fading suppression in MIMO-CDMA wireless networks","authors":"Ioana M. Marcu, C. Voicu, S. Halunga, R. Preda","doi":"10.4108/eai.10-7-2018.155052","DOIUrl":"https://doi.org/10.4108/eai.10-7-2018.155052","url":null,"abstract":"In multiuser wireless communication systems, signal recovery, even at low BER is a relevant factor for ensuring a safe and reliable communication. Efforts for interference minimization include multiple analysis of source coding/decoding techniques, channel coding/decoding techniques and multiuser detection algorithms. This paper illustrates the improvement brought by LDPC technique in SS systems when AWGN and Rayleigh/Nakagami-m fading occur on communication channel. Performances are evaluated for different sets of spreading sequences (Walsh-Hadamard, Kasami and PN) and based on the simulation results several conclusions are highlighted and further improvement will be proposed for fading effects reduction and interference minimization.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132674459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining Interdependencies among NFRs in Agile Environment to Reduce Conflicts 确定敏捷环境中nfr之间的相互依赖关系以减少冲突
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2018-03-22 DOI: 10.4108/eai.22-3-2018.154384
Jawad Ali, Muhammad Shoaib Shoukat, Muhammad Faisal
{"title":"Determining Interdependencies among NFRs in Agile Environment to Reduce Conflicts","authors":"Jawad Ali, Muhammad Shoaib Shoukat, Muhammad Faisal","doi":"10.4108/eai.22-3-2018.154384","DOIUrl":"https://doi.org/10.4108/eai.22-3-2018.154384","url":null,"abstract":"NFRs play a very key role in the development of high quality software. As NFRs are quality attributes of the software system, so it must be dealt properly and with care in the early phases of software development otherwise it will lead the system to failure or dismissal of quality requirement at later phases. NFRs have a very unique ability to conflict and contradict among themselves. And the main reason behind this ability of NFRs is interdependency, which should be found and dealt properly in order to avoid requirement dismissal. Agile methodologies only focus on functional requirements but neglects non-functional requirements. In this work, we identified and highlighted all the possible dependencies between different NFRs in agile environment. In addition we also proposed a specific framework to cope up with the identified dependencies between NFRs.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115267953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Expert System for Handling Congestion in Opportunistic Network 机会网络拥塞处理专家系统
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2018-03-22 DOI: 10.4108/eai.22-3-2018.154386
Ahthasham Sajid, Khalid Hussain
{"title":"Expert System for Handling Congestion in Opportunistic Network","authors":"Ahthasham Sajid, Khalid Hussain","doi":"10.4108/eai.22-3-2018.154386","DOIUrl":"https://doi.org/10.4108/eai.22-3-2018.154386","url":null,"abstract":"Opportunistic networks are one of the most popular categories of mobile Adhoc networks. These types of networks usually have to deal with intermittent disconnected path from source to the destination most of the time therefor suffers from numerous key challenges for successful custody transfer to be done between encounter nodes. There are numerous challenges faced due to such disconnectivity within the network but one of the key challenges is that which intermediate node will be selected as custody transfer and till how much time custodian node can carry messages as it will have storage constraints until a destination node is found. In this research study the same problem has been addressed via proposing a rule based expert system that will have better coordination among intermediate nodes for the transmission with less drop and better delivery ratio. Proposed technique has been tested and validated via ONE simulator and compared with MaxProp protocol.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NPRA: Novel Policy Framework for Resource Allocation in 5G Software Defined Networks NPRA: 5G软件定义网络资源分配的新策略框架
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2018-03-22 DOI: 10.4108/eai.22-3-2018.154387
Sahrish Khan Tayyaba, Adnan Akhunzada, Noor Ul Amin, M. A. Shah, Faheem Khan, Ihsan Ali
{"title":"NPRA: Novel Policy Framework for Resource Allocation in 5G Software Defined Networks","authors":"Sahrish Khan Tayyaba, Adnan Akhunzada, Noor Ul Amin, M. A. Shah, Faheem Khan, Ihsan Ali","doi":"10.4108/eai.22-3-2018.154387","DOIUrl":"https://doi.org/10.4108/eai.22-3-2018.154387","url":null,"abstract":"In cellular networks, physical resources are always limited, especially when shared among different contributors such as mobile network operator (MNO) or mobile virtual network operators (MVNO) etc. Software Defined Network (SDN) and Network Function Virtualization (NFV) is a Current research area. SDN-based cellular networks provide high Quality of Services (QoS) to the end-user and NFV provides isolation. The sharing of resources is often provided by leveraging virtualization. SDN can generate new forwarding rules and policies for dynamic routing decision based on the traffic classification. However, virtualization in cellular networks is still in infancy and many issues and challenges remain unaddressed. The queue-length problem for providing QoS is cellular network requires attention. The queue management requires separate management protocols for fair allocation of resources. In this research paper, we propose a novel framework for resource allocation and bandwidth management in the 5G cellular network. We are using two level of virtualization, i.e., implementing dynamic resource optimization at network slice manager and executing optimized policies at the wireless virtual manager.","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122236488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Effect of Congestion Control Model on Congested Traffic Flow in Vehicular Ad Hoc Networks (VANETs) 车辆自组织网络中拥塞控制模型对拥塞交通流的影响
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2018-03-22 DOI: 10.4108/eai.22-3-2018.154371
A.A.K. Azameti, F. Katsriku, P. Chong, J. Abdulai
{"title":"The Effect of Congestion Control Model on Congested Traffic Flow in Vehicular Ad Hoc Networks (VANETs)","authors":"A.A.K. Azameti, F. Katsriku, P. Chong, J. Abdulai","doi":"10.4108/eai.22-3-2018.154371","DOIUrl":"https://doi.org/10.4108/eai.22-3-2018.154371","url":null,"abstract":"","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126287987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Analysis and Route Optimization of State of the Art Routing Protocols 最新路由协议的比较分析与路由优化
EAI Endorsed Trans. Mob. Commun. Appl. Pub Date : 2018-03-22 DOI: 10.4108/eai.22-3-2018.154385
I. Khan, I. Qureshi, Syed Bilal Hussain Shah, M. Akhlaq, Alamgir Safi, Muhammad Asghar Khan, Anjum Nazir
{"title":"Comparative Analysis and Route Optimization of State of the Art Routing Protocols","authors":"I. Khan, I. Qureshi, Syed Bilal Hussain Shah, M. Akhlaq, Alamgir Safi, Muhammad Asghar Khan, Anjum Nazir","doi":"10.4108/eai.22-3-2018.154385","DOIUrl":"https://doi.org/10.4108/eai.22-3-2018.154385","url":null,"abstract":"Performance of any network is based on the routing protocols. RIP, Session, OSPF and BGP are the few commonly used dynamic routing protocols used in today’s networks. Routing refers to the phenomenon of selecting the best available path to forward packets to its destination. It is a core feature for any network because the performance of the networks heavily depends upon it. In this paper we will perform comparative analysis by using Distance Vector, Link State and Session routing protocol. We will study Packet drop rate (PDR), Bandwidth / Link Utilization, End to End Delay, throughput behavior of these protocols by using network simulator 2 (ns2) for route optimization & comparative analysis to find optimal routing protocol","PeriodicalId":299985,"journal":{"name":"EAI Endorsed Trans. Mob. Commun. Appl.","volume":"345 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116316054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信