2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies最新文献

筛选
英文 中文
Performance Analysis of Contention-Based Random Access Procedure in Clustered LTE Networks 集群LTE网络中基于竞争的随机访问过程性能分析
A. Khan, Junaid Khalid, H. K. Qureshi
{"title":"Performance Analysis of Contention-Based Random Access Procedure in Clustered LTE Networks","authors":"A. Khan, Junaid Khalid, H. K. Qureshi","doi":"10.1109/NGMAST.2013.44","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.44","url":null,"abstract":"Long Term Evolution (LTE) is a 4G standard for mobile networks, and has proven to be the only viable solution. In this paper, we have presented a new analytical model that describes the contention-based random access request procedure of LTE networks for dynamic request generation, including clustering and non-clustering schemes. The model takes into account the uniform back-off as well as the waiting period for the resource assignment and possible message delivery failures because of the collisions and resource starvation. The proposed model is empirically verified under simulation environment by measuring the collision probability, throughput and resource utilization. The results demonstrate that, when the network load is high, the clustering scheme performs better than non-clustering scheme.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123829501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Dynamic Downlink Power Control Strategies for LTE Femtocells LTE飞蜂窝的动态下行功率控制策略
Xiang Xu, G. Kutrolli, R. Mathar
{"title":"Dynamic Downlink Power Control Strategies for LTE Femtocells","authors":"Xiang Xu, G. Kutrolli, R. Mathar","doi":"10.1109/NGMAST.2013.40","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.40","url":null,"abstract":"In this work, dynamic downlink power control schemes based on user type identification are proposed for LTE (Long Term Evolution) femtocells. In the proposed schemes, the users are distinguished by their serving cells and service types, and the power control is performed accordingly. Moreover, with a variable setting of data rate offset, the proposed schemes can achieve superior performance in terms of a well-balanced data throughput and coverage.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121917919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Model Federation and Probabilistic Analysis for Advanced OSS and BSS 高级OSS和BSS的模型联合与概率分析
J. Niemöller, L. Mokrushin, K. Vandikas, Stefan Avesand, L. Angelin
{"title":"Model Federation and Probabilistic Analysis for Advanced OSS and BSS","authors":"J. Niemöller, L. Mokrushin, K. Vandikas, Stefan Avesand, L. Angelin","doi":"10.1109/NGMAST.2013.30","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.30","url":null,"abstract":"Advanced OSS and BSS will be expected to operate cooperatively and across multiple domains and business layers. This can be reached with shared information models providing a comprehensive insight into the entire operated heterogeneous environment. This paper contributes to this vision in two respects. It first introduces a technique for creating a federated information model by inter-relating existing and potentially very different domain specific models. Furthermore, the resulting federated model is used as structural base for defining probabilistic analysis with a Bayesian network. This demonstrates how valuable insights can be obtained through model federation rather than solely relying on separated models reaching only a limited set of information.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modular Test System for Determination of Protection against Attacks in VoIP Networks VoIP网络攻击防护判定的模块化测试系统
M. Voznák, F. Rezac, J. Rozhon
{"title":"Modular Test System for Determination of Protection against Attacks in VoIP Networks","authors":"M. Voznák, F. Rezac, J. Rozhon","doi":"10.1109/NGMAST.2013.31","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.31","url":null,"abstract":"A VoIP (Voice over Internet Protocol) soft switch is essential for every IP telephony infrastructure. Frequently, it provides other services besides those related to VoIP. Very often, these switches are the target of external attackers. This article describes the system designed to test whether the targeted VoIP soft switch is sufficiently secured and protected against possible real threats. The system tests the switches for resistance to the most prevailing attacks. Based on whether the penetration is successful or not, the system assesses their overall security. The article describes applications and algorithms used by the system. The conclusion includes recommendations and principles to ensure efficient protection of a VoIP soft switch against existing threats. The system is designed as an open-source web application, allowing for access irrespective of the operation system platform, and can be extended with additional testing modules.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127031402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System DroidVulMon——基于Android的移动设备漏洞分析与监控系统
Y. Ham, Hyung-Woo Lee, Jae-Deok Lim, Jeongnyeo Kim
{"title":"DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System","authors":"Y. Ham, Hyung-Woo Lee, Jae-Deok Lim, Jeongnyeo Kim","doi":"10.1109/NGMAST.2013.14","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.14","url":null,"abstract":"The use of Android platform based mobile terminals has been growing high. On the down side, the number of attacks by malicious application is also increasing because Android platform is vulnerable to private information leakage. These malicious applications are easily distributed to users through open market or internet. An attacker inserts malicious code into mobile app which could be harmful tool to steal private data. To cope with security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile terminal and take an appropriate action to protect the system against malicious attacks. Therefore, this paper investigates security-related vulnerability for mobile terminal and suggests 'DroidVulMon' system to detect and respond attacks in order to prevent information leakage caused by malicious app.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130741069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
User Experiences in ThrowIt: A Natural UI for Sharing Objects between Mobile Devices ThrowIt的用户体验:在移动设备之间共享对象的自然UI
T. Koskela, Leena Arhippainen, Matti Pouke, Antti Karhu, Seamus Hickey
{"title":"User Experiences in ThrowIt: A Natural UI for Sharing Objects between Mobile Devices","authors":"T. Koskela, Leena Arhippainen, Matti Pouke, Antti Karhu, Seamus Hickey","doi":"10.1109/NGMAST.2013.22","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.22","url":null,"abstract":"The success of context-aware systems depends on intuitive user interface designs which facilitate communication between multiple devices. This paper presents Throw It, a natural user interface for sharing objects between mobile devices using gaze and hand gestures. For enabling gesture control, Throw It includes an off-the-shelf monochrome camera with infrared lights and a hand-held 6 degree of freedom sensor. To share an object, the user first locks their gaze on the object, then selects the object by doing a short 'grab' gesture, and finally, sends the object to another mobile device by doing a 'throwing' gesture. The mobile devices locate each other via a context server. According to the results of our user study, the idea of sharing digital objects using Throw It was found both useful and fascinating. However, sharing objects to many people at the same time raised security concerns.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130861873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Throughput Optimization for Cooperative Spectrum Sensing in Cognitive Radio Networks 认知无线电网络中协同频谱感知的吞吐量优化
D. Teguig, B. Scheers, V. L. Nir
{"title":"Throughput Optimization for Cooperative Spectrum Sensing in Cognitive Radio Networks","authors":"D. Teguig, B. Scheers, V. L. Nir","doi":"10.1109/NGMAST.2013.50","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.50","url":null,"abstract":"In this paper, the channel utilization (throughput vs. sensing time relationship) is analyzed for cooperative spectrum sensing under different combining rules and scenarios. The combining rules considered in this study are the OR hard combining rule, the AND hard combining rule, the Equal Gain Soft combining rule and the two-bit quantized (softened hard) combining rule. For all combining rules, the detection performance, with a Gaussian distribution assumption, is expressed in two different scenarios, CPUP (Constant Primary User Protection) and CSUSU (Constant Secondary User Spectrum Usability). A comparison, based on simulations, is conducted between these proposed schemes in both scenarios, in terms of detection performance and throughput capacity of the CR network.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123753551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Transaction-centric Mobile-Payment Classification Model 以交易为中心的移动支付分类模型
A. Aljohani, K. Al-Begain
{"title":"Transaction-centric Mobile-Payment Classification Model","authors":"A. Aljohani, K. Al-Begain","doi":"10.1109/NGMAST.2013.21","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.21","url":null,"abstract":"Even after a decade of trials, Mobile-Payment systems are yet to witness large-scale commercial deployments. Various studies have been conducted to investigate the cause resulting in the various theories and analysis. Based on the extensive literature survey conducted as part of this research work, three causes have been identified namely, the heterogeneous nature of the m-payment landscape, lack of co-operation amongst the various m-payment players and lack of standardization. All the stakeholders of m-payment ecosystem agree that there is a need for a universal, standardized m-payment platform. In this regard, this paper proposes that there is a need for a new classification model in order to design the universal m-payment system. A model that is transaction-centric rather than the currently existing models that are m-payment player-centric.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121719968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using the ADL Experience API for Mobile Learning, Sensing, Informing, Encouraging, Orchestrating 使用ADL体验API进行移动学习,感知,通知,鼓励,编排
C. Glahn
{"title":"Using the ADL Experience API for Mobile Learning, Sensing, Informing, Encouraging, Orchestrating","authors":"C. Glahn","doi":"10.1109/NGMAST.2013.55","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.55","url":null,"abstract":"The new ADL Experience API is an attempt for better interoperability between different types of educational systems and devices. This new specification is designed to link sensor networks for collecting and analyzing learning experiences in different contexts. This paper analyses how the concepts of the Experiences API were integrated in a mobile learning application and how the app uses learning analytics functions based on the collected data for informing the learners about their learning performance, for encouraging them to actively use the app, and for orchestrating and sequencing the learning resources.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Low Complexity 2D Adaptive Channel Estimation for OFDM Based Two-Way Relay Systems 基于OFDM双向中继系统的低复杂度二维自适应信道估计
Arun Joy, Vijay Kumar Chakka
{"title":"Low Complexity 2D Adaptive Channel Estimation for OFDM Based Two-Way Relay Systems","authors":"Arun Joy, Vijay Kumar Chakka","doi":"10.1109/NGMAST.2013.42","DOIUrl":"https://doi.org/10.1109/NGMAST.2013.42","url":null,"abstract":"This paper introduces a low complexity adaptive channel estimation technique for OFDM based two-way relay systems. The adaptive filter used is known as Group Fast Array Multichannel 2D-Recursive Least Square (GFAM 2DRLS) filter. It has a computational complexity comparable to that of 2D-Normalized Least Mean Square (2D-NLMS) algorithm while maintaining the same convergence rate as the classic 2D Recursive Least Square (2D-RLS) algorithm. It considers the correlation of the channel frequency response in both time and frequency, while estimating the channel. In order to reduce the number of training data for time varying channel, the channel estimation is carried out based on the Decision Directed (DD) principle. It is assumed that the relay is capable of performing complex signal processing tasks. Hence the channel estimation is performed at the relay. Since the Channel State Information (CSI) is available at the relay, it could perform Multiple Input Multiple Output (MIMO) precoding of the transmitted data. Hence CSI is not required at the transmitting nodes. The convergence rate of GFAM 2D-RLS is compared with the existing 2D-NLMS algorithm and the computational complexity at each iteration is tabulated. Simulations are performed using MATLAB.","PeriodicalId":369374,"journal":{"name":"2013 Seventh International Conference on Next Generation Mobile Apps, Services and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130668782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信