Samaneh Igder, S. Bhattacharya, B. Qazi, J. Elmirghani
{"title":"Standalone Green Cache Points for Vehicular Content Distribution Networks","authors":"Samaneh Igder, S. Bhattacharya, B. Qazi, J. Elmirghani","doi":"10.1109/NGMAST.2016.18","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.18","url":null,"abstract":"With the rapid growth of interest in media-rich user experience, content distribution networks (CDNs) gained considerable attention. Since, most of the energy is consumed by cache points (CPs) and the associated equipment, it is imperative to deploy fewer number of CPs or switch off as many as possible to save energy. This results in degraded quality of service (QoS). It is an usual dimensioning technique to optimise the number and locations of caching points (CPs) of a content distribution network (CDN), where the objective is to reduce operational energy. In this paper, we reduce non-renewable energy consumption (carbon footprint) by introducing renewable grid energy (in the form of wind energy) and adaptive CPs. Further, we propose algorithms for provisioning high number of simultaneous downloads, which reduce overall waiting time and number of dropped request of city vehicular users. The end result is substantial improvement in quality of service (QoS). The proposed CPs save 100% grid energy during the whole day while fulfilling content demand in a city vehicular environment.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122999030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emotion and Playful Elements in Mobile Learning","authors":"Nurwahida Faradila Taharim, A. Lokman, W. Isa","doi":"10.1109/NGMAST.2016.23","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.23","url":null,"abstract":"Integrating learner's emotion using a playful approach is seen as one of the best mechanism to enhance learner's experience in mobile learning. Thus, the research strives to determine the emotional responses that is formed by playful elements in mobile learning applications. The Kansei Design Model was adopted in this research to assess the emotional responses of thirty subjects towards six evaluation specimens that were carefully selected. In the assessment procedure, a total of 12 emotional keywords were identified suitable to portray emotional dimension to the domain. The result revealed that the design of playful mobile learning applications could be represented through the joyful and pleasurable concept. A joyful design seems to have bright colours and fun. A pleasurable design seems to have colourful display and pictures. The result could be used as insights in designing future playful mobile learning applications, which embeds targeted emotional responses by users.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115358590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Distribution in IoT Networks with Estimation of Packet Error Rate","authors":"Seunghun Jeon, Jihyoung Ahn, Tae-Jin Lee","doi":"10.1109/NGMAST.2016.25","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.25","url":null,"abstract":"Internet of Things (IoT) is a network of things with wireless networks for connecting things and people on a massive scale. Energy harvesting from a surrounding environment is one of the key techniques to achieve a sustainable IoT network. In an IoT environment, reliable broadcast plays an important role to distribute data to a large number of surrounding devices. Forward Error Correction (FEC) enables a receiver to detect and correct errors for a received packet. The fountain code, which is a type of FEC, is suitable for IoT environment due to its high scalability and low complexity. When the FEC is applied to a data broadcast scenario in IoT networks, fast and reliable broadcast can be achieved. In this paper, we propose a new broadcast method to utilize a moving average to estimate a packet error rate of the current frame in the environment with a large number of connected devices. This proposed scheme is desirable to achieve high data restoration probability by obtaining a proper number of output packets.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127306620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong-Kul Ki, Jin-Wook Choi, Kwang-Soo Bae, Gye-Hyeong Ahn, Kyu-Cheol Cho
{"title":"An Efficient Failure Detection Algorithm for CCTV and Roadside Equipment (RSE)","authors":"Yong-Kul Ki, Jin-Wook Choi, Kwang-Soo Bae, Gye-Hyeong Ahn, Kyu-Cheol Cho","doi":"10.1109/NGMAST.2016.30","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.30","url":null,"abstract":"Travel speed is an important parameter for measuring road traffic. Urban Traffic Information System (UTIS) was developed as a mobile detector for measuring link travel speeds in South Korea. UTIS is mainly a means of collecting enhanced roadway condition information and then broadcasting related traveler information and various alerts back to vehicles. The proposed wireless media is based on UTIS technology operating at 5.725~5.825 GHz in South Korea. Under the UTIS concept, vehicles will be equipped with an UTIS radio, a highly accurate on-board positioning system, an appropriately configured on-board computer to facilitate communications, support various applications, and provide an interface for the driver. This equipment is collectively referred to as the On-Board Equipment (OBE). Vehicles communicate with Roadside Equipment (RSE), which is linked to the specialized UTIS network. RSEs and CCTVs are positioned at major signaled intersections and along major arterial roads. However, RSEs and CCTVs incur errors caused by the lack of probe vehicles on road segments, system failures and etc. In this paper, we suggests a new model for RSE and CCTV failure detection using neural networks to provide accurate link travel speeds and traffic information to the public.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124234238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Universal Filtered Multi-carrier Performance Analysis with Multipath Fading Channels","authors":"Sherief Helwa, Michael Ibrahim, S. El-Ramly","doi":"10.1109/NGMAST.2016.19","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.19","url":null,"abstract":"The anticipated services of the 5th Generation mobile networks (5G) requires new technologies to be introduced and to be thoroughly investigated in order to assess their ability to satisfy the new 5G system requirements. The main focus of this paper is the relaxed system synchronization procedures used to meet the new 5G requirements which cannot be satisfied by strictly synchronized OFDM systems and their costly synchronization procedures The most promising technology to replace OFDM in 5G is Universal Filtered Multi-Carrier (UFMC) whose performance has already been assessed in literature where the main focus was proving the enhanced performance of UFMC in presence of Carrier Frequency Offsets (CFO) and Timing Offsets (TO) arising from the reduced synchronization limitations. In this paper we address a new aspect of UFMC performance by investigating its capability to overcome the multipath fading channels' effects and to provide good and reliable performance levels without using the cyclic prefix concept introduced in OFDM to overcome these channel effects.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117039087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zigrid Shehu, Claudio Ciccotelli, Daniele Ucci, Leonardo Aniello, R. Baldoni
{"title":"Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware","authors":"Zigrid Shehu, Claudio Ciccotelli, Daniele Ucci, Leonardo Aniello, R. Baldoni","doi":"10.1109/NGMAST.2016.16","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.16","url":null,"abstract":"App fingerprints can be used to verify whether two apps are the same, and are useful tools for malware detection because they can allow to recognize obfuscated versions of known malware. Fingerprinting an app on the base of static features is known to fail against obfuscation, as it is successful in hiding the static characteristics that reveal the malicious nature of an app. In this paper we propose a novel way to compute app fingerprints, which is based on behavioral features. The aim is to capture the semantics of the app, so that obfuscation results ineffective. The technique we introduce exploits invariants, found among pairs of metrics, collected during app execution, and produces a fingerprint consisting of the list of the correlation values of these pairs. We present an experimental evaluation carried out on a real Android device, whose obtained results support the methodology we propose, and show it can be a viable research direction to investigate further.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122280587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abir Awad, Sara Kadry, Brian A. Lee, Gururaj Maddodi, Eoin O'Meara
{"title":"Integrity Assurance in the Cloud by Combined PBA and Provenance","authors":"Abir Awad, Sara Kadry, Brian A. Lee, Gururaj Maddodi, Eoin O'Meara","doi":"10.1109/NGMAST.2016.15","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.15","url":null,"abstract":"In this paper, we propose a new integrity assurance system in the cloud by using both hard and soft attestations. By hard attestation, we mean the usage of trusted computing to certify the machines in the cloud or to detect any tamper on the system level including boot, bios and operating system. The soft assurance mechanism is based on the analysis of the cloud provenance data which are collected by logging kernel system calls. This mechanism is data centric which means that it allows the detection of any changes to data artifacts in the cloud. The results of our integrity assurance system is communicated to the user using Cloud Trust Protocol (CTP) developed by the Cloud Security Alliance (CSA). Our proposed scheme is tested on an OpenStack cloud to show a proof of concept of our integrity assurance system.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134352445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of MAC Scheduler in LTE (EUTRAN) for \"ASAR\": Resource Allocation","authors":"Ankit Saxena, R. Sindal","doi":"10.1109/NGMAST.2016.27","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.27","url":null,"abstract":"Evolved UMTS Terrestrial Radio Access Network (EUTRAN) offer high uplink and downlink throughput. This enhances user experience in term of Quality-of-Service (QoS). Radio resource allocation is a complex arrangement of resources in multiuser scenario. Generally in network, radio resources are configured in pool, however resources are offered to user on the basis of \"as soon as required (ASAR)\". LTE in EUTRAN provides radio resource to user, with different scheduling mechanism. This definitely reduces network capacity in whole, but at the same time increases resources availability per user at particular state of time. In every cycle of resource allocation a feedback mechanism works to cater operational resource requirement. In this paper we investigate performance of different strategies of resource allocation, driven through different scheduler such as round robin, proportional fair, best channel quality indicator (CQI), max transmission point (TP) and resource fair(RF). We evaluate strategy for resource allocation under indistinguishable arrangement and conclude with comparative performance analysis and find proportional fair offers balance throughput, fairness and spectral efficiency.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130268569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Search Space Allocation Schemes Review for Control Channels in LTE and LTE-advanced","authors":"F. Nabil, Y. Fahmy","doi":"10.1109/NGMAST.2016.24","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.24","url":null,"abstract":"The search space allocation scheme is a very important operation done to schedule users in the resources of the control channels PDCCH and enhanced PDCCH. However, the standard scheme has many drawbacks as it allocates each user a contiguous number of candidates to blindly search for its control information. This paper reviews some of the proposed designs in literature for the search space allocation scheme and compares them to provide a thorough performance analysis. Simulation results showed some comparisons between the proposed schemes in literature and the standard scheme using three different metrics. Finally, the scattered design was proved to be of the best overall performance although some schemes have comparable performance in the blocking probability metric.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122638492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Strategies for Pedestrian Guidance Using Commodity Smartphones","authors":"Johan Mollevik","doi":"10.1109/NGMAST.2016.12","DOIUrl":"https://doi.org/10.1109/NGMAST.2016.12","url":null,"abstract":"This paper describes the user evaluation of two different strategies for guiding pedestrians. This work is based on a hands free, eyes free scenario explored by SpaceBook [1], using cheap Android phones. The first model described is a comparatively simple purely reactive model [2]. The second is using more involved techniques including prediction of future positions and scheduling [3]. The paper describes both models discussing identified problems with them. It then goes on to describe our evaluation procedure and the results of the evaluation.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}