{"title":"Performance Analysis of Contention-Based Random Access Procedure in Clustered LTE Networks","authors":"A. Khan, Junaid Khalid, H. K. Qureshi","doi":"10.1109/NGMAST.2013.44","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.44","url":null,"abstract":"Long Term Evolution (LTE) is a 4G standard for mobile networks, and has proven to be the only viable solution. In this paper, we have presented a new analytical model that describes the contention-based random access request procedure of LTE networks for dynamic request generation, including clustering and non-clustering schemes. The model takes into account the uniform back-off as well as the waiting period for the resource assignment and possible message delivery failures because of the collisions and resource starvation. The proposed model is empirically verified under simulation environment by measuring the collision probability, throughput and resource utilization. The results demonstrate that, when the network load is high, the clustering scheme performs better than non-clustering scheme.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123829501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Downlink Power Control Strategies for LTE Femtocells","authors":"Xiang Xu, G. Kutrolli, R. Mathar","doi":"10.1109/NGMAST.2013.40","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.40","url":null,"abstract":"In this work, dynamic downlink power control schemes based on user type identification are proposed for LTE (Long Term Evolution) femtocells. In the proposed schemes, the users are distinguished by their serving cells and service types, and the power control is performed accordingly. Moreover, with a variable setting of data rate offset, the proposed schemes can achieve superior performance in terms of a well-balanced data throughput and coverage.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121917919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Niemöller, L. Mokrushin, K. Vandikas, Stefan Avesand, L. Angelin
{"title":"Model Federation and Probabilistic Analysis for Advanced OSS and BSS","authors":"J. Niemöller, L. Mokrushin, K. Vandikas, Stefan Avesand, L. Angelin","doi":"10.1109/NGMAST.2013.30","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.30","url":null,"abstract":"Advanced OSS and BSS will be expected to operate cooperatively and across multiple domains and business layers. This can be reached with shared information models providing a comprehensive insight into the entire operated heterogeneous environment. This paper contributes to this vision in two respects. It first introduces a technique for creating a federated information model by inter-relating existing and potentially very different domain specific models. Furthermore, the resulting federated model is used as structural base for defining probabilistic analysis with a Bayesian network. This demonstrates how valuable insights can be obtained through model federation rather than solely relying on separated models reaching only a limited set of information.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modular Test System for Determination of Protection against Attacks in VoIP Networks","authors":"M. Voznák, F. Rezac, J. Rozhon","doi":"10.1109/NGMAST.2013.31","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.31","url":null,"abstract":"A VoIP (Voice over Internet Protocol) soft switch is essential for every IP telephony infrastructure. Frequently, it provides other services besides those related to VoIP. Very often, these switches are the target of external attackers. This article describes the system designed to test whether the targeted VoIP soft switch is sufficiently secured and protected against possible real threats. The system tests the switches for resistance to the most prevailing attacks. Based on whether the penetration is successful or not, the system assesses their overall security. The article describes applications and algorithms used by the system. The conclusion includes recommendations and principles to ensure efficient protection of a VoIP soft switch against existing threats. The system is designed as an open-source web application, allowing for access irrespective of the operation system platform, and can be extended with additional testing modules.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127031402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Ham, Hyung-Woo Lee, Jae-Deok Lim, Jeongnyeo Kim
{"title":"DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System","authors":"Y. Ham, Hyung-Woo Lee, Jae-Deok Lim, Jeongnyeo Kim","doi":"10.1109/NGMAST.2013.14","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.14","url":null,"abstract":"The use of Android platform based mobile terminals has been growing high. On the down side, the number of attacks by malicious application is also increasing because Android platform is vulnerable to private information leakage. These malicious applications are easily distributed to users through open market or internet. An attacker inserts malicious code into mobile app which could be harmful tool to steal private data. To cope with security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile terminal and take an appropriate action to protect the system against malicious attacks. Therefore, this paper investigates security-related vulnerability for mobile terminal and suggests 'DroidVulMon' system to detect and respond attacks in order to prevent information leakage caused by malicious app.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130741069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Koskela, Leena Arhippainen, Matti Pouke, Antti Karhu, Seamus Hickey
{"title":"User Experiences in ThrowIt: A Natural UI for Sharing Objects between Mobile Devices","authors":"T. Koskela, Leena Arhippainen, Matti Pouke, Antti Karhu, Seamus Hickey","doi":"10.1109/NGMAST.2013.22","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.22","url":null,"abstract":"The success of context-aware systems depends on intuitive user interface designs which facilitate communication between multiple devices. This paper presents Throw It, a natural user interface for sharing objects between mobile devices using gaze and hand gestures. For enabling gesture control, Throw It includes an off-the-shelf monochrome camera with infrared lights and a hand-held 6 degree of freedom sensor. To share an object, the user first locks their gaze on the object, then selects the object by doing a short 'grab' gesture, and finally, sends the object to another mobile device by doing a 'throwing' gesture. The mobile devices locate each other via a context server. According to the results of our user study, the idea of sharing digital objects using Throw It was found both useful and fascinating. However, sharing objects to many people at the same time raised security concerns.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130861873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Throughput Optimization for Cooperative Spectrum Sensing in Cognitive Radio Networks","authors":"D. Teguig, B. Scheers, V. L. Nir","doi":"10.1109/NGMAST.2013.50","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.50","url":null,"abstract":"In this paper, the channel utilization (throughput vs. sensing time relationship) is analyzed for cooperative spectrum sensing under different combining rules and scenarios. The combining rules considered in this study are the OR hard combining rule, the AND hard combining rule, the Equal Gain Soft combining rule and the two-bit quantized (softened hard) combining rule. For all combining rules, the detection performance, with a Gaussian distribution assumption, is expressed in two different scenarios, CPUP (Constant Primary User Protection) and CSUSU (Constant Secondary User Spectrum Usability). A comparison, based on simulations, is conducted between these proposed schemes in both scenarios, in terms of detection performance and throughput capacity of the CR network.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123753551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transaction-centric Mobile-Payment Classification Model","authors":"A. Aljohani, K. Al-Begain","doi":"10.1109/NGMAST.2013.21","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.21","url":null,"abstract":"Even after a decade of trials, Mobile-Payment systems are yet to witness large-scale commercial deployments. Various studies have been conducted to investigate the cause resulting in the various theories and analysis. Based on the extensive literature survey conducted as part of this research work, three causes have been identified namely, the heterogeneous nature of the m-payment landscape, lack of co-operation amongst the various m-payment players and lack of standardization. All the stakeholders of m-payment ecosystem agree that there is a need for a universal, standardized m-payment platform. In this regard, this paper proposes that there is a need for a new classification model in order to design the universal m-payment system. A model that is transaction-centric rather than the currently existing models that are m-payment player-centric.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121719968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using the ADL Experience API for Mobile Learning, Sensing, Informing, Encouraging, Orchestrating","authors":"C. Glahn","doi":"10.1109/NGMAST.2013.55","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.55","url":null,"abstract":"The new ADL Experience API is an attempt for better interoperability between different types of educational systems and devices. This new specification is designed to link sensor networks for collecting and analyzing learning experiences in different contexts. This paper analyses how the concepts of the Experiences API were integrated in a mobile learning application and how the app uses learning analytics functions based on the collected data for informing the learners about their learning performance, for encouraging them to actively use the app, and for orchestrating and sequencing the learning resources.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low Complexity 2D Adaptive Channel Estimation for OFDM Based Two-Way Relay Systems","authors":"Arun Joy, Vijay Kumar Chakka","doi":"10.1109/NGMAST.2013.42","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.42","url":null,"abstract":"This paper introduces a low complexity adaptive channel estimation technique for OFDM based two-way relay systems. The adaptive filter used is known as Group Fast Array Multichannel 2D-Recursive Least Square (GFAM 2DRLS) filter. It has a computational complexity comparable to that of 2D-Normalized Least Mean Square (2D-NLMS) algorithm while maintaining the same convergence rate as the classic 2D Recursive Least Square (2D-RLS) algorithm. It considers the correlation of the channel frequency response in both time and frequency, while estimating the channel. In order to reduce the number of training data for time varying channel, the channel estimation is carried out based on the Decision Directed (DD) principle. It is assumed that the relay is capable of performing complex signal processing tasks. Hence the channel estimation is performed at the relay. Since the Channel State Information (CSI) is available at the relay, it could perform Multiple Input Multiple Output (MIMO) precoding of the transmitted data. Hence CSI is not required at the transmitting nodes. The convergence rate of GFAM 2D-RLS is compared with the existing 2D-NLMS algorithm and the computational complexity at each iteration is tabulated. Simulations are performed using MATLAB.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130668782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}