2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)最新文献

筛选
英文 中文
The Impact of Higher Order Sectorisation on the Performance of Millimetre Wave 5G Network 高阶分割对毫米波5G网络性能的影响
N. Al-Falahy, O. Alani
{"title":"The Impact of Higher Order Sectorisation on the Performance of Millimetre Wave 5G Network","authors":"N. Al-Falahy, O. Alani","doi":"10.1109/NGMAST.2016.20","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.20","url":null,"abstract":"The fifth Generation (5G) mobile network will provide services with extreme data rate and latency demands compared to current cellular network, and provide massive capacity and connectivity to multitude of devices with diverse requirements and applications. Therefore, it is important to utilise all network resources to provide the 5G vision. In this paper, performance evaluations and impact of higher order horizontal sectorisation on next generation 5G mobile access is presented. The study has been focused on busy urban areas in high carrier frequency. Millimetre wave band has precious wide unexploited bandwidth that can be harnessed for mobile communication. The results for these scenarios show that higher-order horizontal sectorisation in millimetre wave based smallcell deployment can significantly increase the network capacity to meet the future requirement of 5G network, and provide high data rate and connectivity to huge number of devices. Moreover, beamforming can highly increase the data rate by efficiently increase signal power and suppress interference from unwanted directions.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115753459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Human Workflow Modelling in Homogeneous Computor Networks 同构计算机网络中的人类工作流建模
J. A. Johnson, A. A. Adekunle
{"title":"Human Workflow Modelling in Homogeneous Computor Networks","authors":"J. A. Johnson, A. A. Adekunle","doi":"10.1109/NGMAST.2016.21","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.21","url":null,"abstract":"Maintaining consistent operational efficiency and productivity levels through effective and reliable workflow processes can be the key to businesses realising long-term profit margins. This can be difficult to achieve if the challenges that affect this dual paradigm are not fully understood. Where human input is an integral part of the business workflow, the existing methods for modelling this human interaction are too abstract in nature and are not appropriate for deriving performance characteristics about human input into the process. This paper introduces a novel approach to classifying humans for the purpose of workflow modelling. Following this classification we further demonstrate that an analytical method, such as queueing theory, can be used to extract the resource utilisation and throughput characteristics of humans engaged in a business workflow processes. The initial results from experimentations indicate that the resource utilisation and throughput levels of humans could provide insight into where performance gains and increased throughput can be made. We do not consider the unique behavioural characteristics of humans that could influence the resource utilisation or throughput rates as part of our current research.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132451875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Location Privacy Awareness on Geo-Social Networks 地理社交网络的位置隐私意识
Fatma S. Alrayes, A. Abdelmoty
{"title":"Towards Location Privacy Awareness on Geo-Social Networks","authors":"Fatma S. Alrayes, A. Abdelmoty","doi":"10.1109/NGMAST.2016.26","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.26","url":null,"abstract":"With the current trend of embedding location services within social networks, an ever growing amount of users' spatiotemporal tracks are being collected and used to generate user profiles. Issues of personal privacy and especially those stemming from tracking user location become more important to address. In this work, it is argued that support of location privacy awareness within social networks is needed to maintain the users' trust in their services. Current practices of pre-configuring location disclosure settings have been shown to be limited, where users' sense of location privacy dynamically change with context. In this paper, location privacy awareness is considered within a composite view of place, time and social data recorded in user profiles. The paper examines the possible threats to personal privacy from exposure of this data and the design of feedback tools to allow users to control their privacy. A user study is used to examine the impact of the feedback provided on users' perception of privacy and the link between their privacy concerns and their attitude towards using the geo-social network. Findings confirm the strong need for more transparent access to and control over user location profiles, and guide the proposal of recommendations to the design of more privacy-sensitive geo-social networks.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116037358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Energy Efficient Fog Servers for Internet of Things Information Piece Delivery (IoTIPD) in a Smart City Vehicular Environment 智能城市车辆环境中用于物联网信息块交付(IoTIPD)的节能雾服务器
Samaneh Igder, S. Bhattacharya, J. Elmirghani
{"title":"Energy Efficient Fog Servers for Internet of Things Information Piece Delivery (IoTIPD) in a Smart City Vehicular Environment","authors":"Samaneh Igder, S. Bhattacharya, J. Elmirghani","doi":"10.1109/NGMAST.2016.17","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.17","url":null,"abstract":"Smart cities are promising solution for providing efficient services to the citizens with the use of Information and Communication Technologies. City automation has become essential concept for improving the quality of the citizens' lives, which gives rise to smart cities. Fog computing for Internet of Things (IoT) is considered recently an essential paradigm in smart city scenarios. In this work, we propose energy efficient Fog Servers (FSs), which delivers the information data to the mobile users (in the vehicle). We introduced the concept of energy efficiency through the judicious distribution of non-renewable or/and renewable energy to the FS, which improves outage (and dropping probability. As a first step, we optimise the locations of the FSs for IoT Information Piece Delivery (IoTPD) in a smart city vehicular environment with dropping less than 5%. Then, we maximised the energy savings by pushing dropping to a certain level (5%). To improve the dropping, the available renewable (wind) grid energy is optimally allocated to each FS. This, in turn, also reduces carbon footprint.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130346152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Traffic Pattern Based Adaptive Spectrum Handoff Strategy for Cognitive Radio Networks 基于业务模式的认知无线网络自适应频谱切换策略
I. Hanif, M. Zeeshan, Akhlaque Ahmed
{"title":"Traffic Pattern Based Adaptive Spectrum Handoff Strategy for Cognitive Radio Networks","authors":"I. Hanif, M. Zeeshan, Akhlaque Ahmed","doi":"10.1109/NGMAST.2016.10","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.10","url":null,"abstract":"Increase in number of commodity devices using network connection raised the spectrum demand largely. The present static spectrum allocation policy gave birth to the so called spectrum scarcity problem. Cognitive Radio enhances the bandwidth usage through Dynamic Spectrum Access without affecting the allocated spectrum, therefore offers a feasible solution to the problem of spectrum scarcity. Enhancing the spectrum usage efficiently, cognitive radio technology allows secondary users to acquire underutilized licensed spectrum band. Smooth spectrum mobility in cognitive radio networks is extremely necessary to ensure the continuity and quality of service. This work aims to develop a dynamic horizontal handoff strategy that adopts according to the traffic pattern of PU. Proposed model keeps track of mobility patterns on certain primary spectrum and classifies these spectrum channels based on primary user's arrival on them. Handoff strategy decision is based on these classified patterns, which can be either proactive or reactive strategy. Analytical results demonstrate that proposed model optimizes channel utilization, minimize handoff delays while maximizing overall network capacity.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132392444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
iTourism Travel Buddy Mobile Application 旅游伙伴移动应用程序
Afiza Ismail, S. A. Kadir, A. Aziz, M. Mokhsin, A. Lokman
{"title":"iTourism Travel Buddy Mobile Application","authors":"Afiza Ismail, S. A. Kadir, A. Aziz, M. Mokhsin, A. Lokman","doi":"10.1109/NGMAST.2016.22","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.22","url":null,"abstract":"Malaysia is a melting pot that encompasses extremely diversified cultures, ethnicity, religions and languages. Tourist information in the country is commonly found in the form of printed materials as well as printed maps. This leads to issues like environmentally unfriendly, less visibility in promoting the tourism potential as well as an ineffective way to disperse information. The work attempts to provide a solution to this problem by providing a tourism mobile application that supports tourism information with assistive travel features to ease tourists by using technology that is closest to them. The project adopted the RAD in the process of design and development of the application, employing an interview approach to international tourists at the airport, observation to existing assistive tourist systems, and conducts a survey using questionnaires to potential users. The result enables the work to develop the iTourism mobile application in order to meet the demand of tourists. The results revealed that there are major suggestions relating to the need for a travel mobile application to assist tourists in finding interesting places as well as related services. This mobile application is important for Tourism Malaysia in order to enhance its performance in promoting Malaysia locally and internationally. The tourism industry can also capitalise on the advantage of this application in order to gain visitor feedback on their products or services. The application also offers tourist a secured journey, as they can recheck the information and places of interest as it is enhanced with GPS features.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133701671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
TDMA-based MAC (CVTMAC) in Green Vehicular Networks 绿色车辆网络中基于tdma的MAC (CVTMAC)
G. A. Audu, S. Bhattacharya, J. Elmirghani
{"title":"TDMA-based MAC (CVTMAC) in Green Vehicular Networks","authors":"G. A. Audu, S. Bhattacharya, J. Elmirghani","doi":"10.1109/NGMAST.2016.11","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.11","url":null,"abstract":"The growing need to reduce the carbon footprint and the operation expenditure (OPEX) in communication networks necessitates the deployment of wind powered base stations (BSs) and roadside units (RSUs) for vehicular communication networks in windy countries with limited solar irradiation. This system finds ready application in sparse areas like countryside and motorways that lack the supply from the national grid for economic reasons. The stringent performance requirement of vehicular communication systems owed to their critical services poses challenges to their greening efforts. In this paper, we design a robust time-division multiple access (TDMA) based MAC for an infrastructure based green vehicular network in a motorway scenario and investigate the network performance against the stringent quality of service (QoS) thresholds. We call the proposed Centralised Vehicular TDMA based MAC as CVTMAC for short. To obtain a realistic performance evaluation, we model and simulate the proposed MAC protocol with the real channel characteristics of the motorway environment fully incorporated. The off grid RSU is powered solely by an economical and easy to deploy small standalone wind energy conversion systems (SSWECS). Wind energy-based rate adaptation is deployed in the RSU to enhance the efficient utilization of available energy (considering the intermittent nature of wind energy). In this study the real vehicular traffic profiles and wind data for a specified motorway region have been utilised. Both analytic and simulation results reveal that with the introduction of small battery capacity (27 Ah), the green vehicular network is able to support QoS for data, audio and video-related applications at each hour of the day in a motorway vehicular environment.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127054436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Evaluation of Apple Pay at Point-of-Sale Terminals Apple Pay在销售点终端的安全性评估
Marian Margraf, Steffen Lange, Florian Otterbein
{"title":"Security Evaluation of Apple Pay at Point-of-Sale Terminals","authors":"Marian Margraf, Steffen Lange, Florian Otterbein","doi":"10.1109/NGMAST.2016.28","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.28","url":null,"abstract":"Apple introduced its mobile payment service \"Apple Pay\" in 2014. It allows customers to pay contactless at point-of-sale (POS) terminals and online. In this paper we will describe the components needed for Apple Pay and evaluate the security of Apple Pay for transactions at POS terminals. We will show that relay attacks cannot be avoided, in general. However, particular security features of Apple Pay prevent that relay attacks can be practically exploited. Our security analysis demonstrates that the security level of Apple Pay is comparable with the security level of payments with traditional credit cards. In contrast to the mobile payment service Google Wallet, no serious security vulnerabilities exist.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124542308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Smart Phone Integrated Smart Classroom 智能手机集成智能课堂
G. Mahesh, K. R. Jayahari, K. Bijlani
{"title":"A Smart Phone Integrated Smart Classroom","authors":"G. Mahesh, K. R. Jayahari, K. Bijlani","doi":"10.1109/NGMAST.2016.31","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.31","url":null,"abstract":"Smart phones are playing a vital role in our day-today life, especially in the field of education. A student can use his personal smart phone for carrying his softcopies of his lecture notes (as storage device), for reading the lecture notes (display device), even it is a complete encyclopaedia due to the technological inventions in smart phone area. Even though smart phones have all these educational advantages, mobile phones are banned in many educational institutions as students misuse the phones during the class, by chatting with friends, playing games... This project involves research and survey to identify how usage of mobile phones at education institutions can be made under the control of authorities and how 1000s of lecture hours can be saved in a year using this device. We propose a mobile application which will help institution authorities to control the students' mobile phones and attendance will be taken by the students itself for saving the time of taking attendance. Students will be forced to run this application as their attendance will be marked through this application. This will also save the lecture time to some extend and will reduce the chances of students marking proxy attendances. Authorities can configure the list of white listed applications students can use in their phones when they are inside the campus.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128823672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Immersive Virtual Reality as a Supplement in the Rehabilitation Program of Post-Stroke Patients 沉浸式虚拟现实作为脑卒中后患者康复计划的补充
Maria Anna V. San Luis, Rowel Atienza, A. S. Luis
{"title":"Immersive Virtual Reality as a Supplement in the Rehabilitation Program of Post-Stroke Patients","authors":"Maria Anna V. San Luis, Rowel Atienza, A. S. Luis","doi":"10.1109/NGMAST.2016.13","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.13","url":null,"abstract":"In a time when prolonging the quality of life better is not just through long-established medical practices but by technology assisting humans, various projects are challenging the traditional methods of caring for a patient. In stroke, desktop virtual environments (DVEs) are being used to supplement the patient's rehabilitation. The type of rehabilitation provides another means for patients to actively participate in the rehabilitation program through motion mirroring using their television or computer screens. However, immersive virtual reality (VR) is also gaining popularity and is challenging the common DVEs in its effectivity through involving more sensory stimulation of the nervous system. The project aims to answer the questions: Would immersion of a patient in VR positively help in their rehabilitation and what are the patient's needs that has to be addressed for it to be effective? To supplement the patients in their rehabilitation program, a mobile VR application is created using VR peripherals available commercially. The basic principle is that immersion in VR will add more sensory and cognitive stimuli to the stroke patient's traditional hospital rehabilitation. Findings of the study show positive effects of including immersive VR in the rehabilitation program of post-stroke patients. In the present, little information is available on the effects of immersive VR in motor rehabilitation. The study quantifies and qualifies its use specifically in the motor rehabilitation of stroke patients.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116038089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信