SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:1383 469X OR L773:1572 8153 "

Sökning: L773:1383 469X OR L773:1572 8153

  • Resultat 1-36 av 36
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Anderson, Ian, et al. (författare)
  • Shakra: tracking and sharing daily activity levels with unaugmented mobile phones
  • 2007
  • Ingår i: Mobile Networks and Applications. - : Springer Science and Business Media LLC. - 1383-469X .- 1572-8153. ; 12:2-3, s. 185-199
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper explores the potential for use of an unaugmented commodity technology—the mobile phone— as a health promotion tool. We describe a prototype application that tracks the daily exercise activities of people, using an Artificial Neural Network (ANN) to analyse GSM cell signal strength and visibility to estimate a user’s movement. In a short-term study of the prototype that shared activity information amongst groups of friends, we found that awareness encouraged reflection on, and increased motivation for, daily activity. The study raised concerns regarding the reliability of ANN-facilitated activity detection in the ‘real world’. We describe some of the details of the pilot study and introduce a promising new approach to activity detection that has been developed in response to some of the issues raised by the pilot study, involving Hidden Markov Models (HMM), task modelling and unsupervised calibration. We conclude with our intended plans to develop the system further in order to carry out a longer-term clinical trial.
  •  
3.
  • Battiti, R., et al. (författare)
  • Wireless LANs : From WarChalking to open access networks
  • 2005
  • Ingår i: Mobile Networks and Applications. - : Springer Science and Business Media LLC. - 1383-469X .- 1572-8153. ; 10:3, s. 275-287
  • Tidskriftsartikel (refereegranskat)abstract
    • This work discusses the evolution of W-LANs from their current status of wireless termination of LAN services to a possible global infrastructure where the access networks become open to multiple operators and a vehicle of a win-win scenario, where both users and operators benefit from the new network architecture. The idea of Open Access Networks (OANs) can go beyond wireless HotSpots and be generalized to a generic shared access infrastructure that fosters service operators competition and drastically reduces the cost of last mile coverage. The general concept of Open Access Networks is detailed, highlighting its difference with the more traditional model of vertical integration of the access network into the global service. About the OANs development, it is shown how to support the quick and smooth evolution of the infrastructure toward a widespread and reliable communication support. Business models are discussed by mentioning the different actors, the market organization and the different organization forms. The final part of the paper is devoted to technical challenges such as access control, security, privacy, roaming, resource exploitation and service differentiation. As an example of how to tackle these problems, we discuss a pricing technique devoted to resource management and billing support. In addition we present a simulation on how the OAN concept can speed-up the deployment of broadband access in a real case.
  •  
4.
  • Chu, Thi My Chinh, et al. (författare)
  • Performance Assessment of OTFS Modulation in High Doppler Airborne Communication Networks
  • 2022
  • Ingår i: Mobile Networks and Applications. - : Springer. - 1383-469X .- 1572-8153. ; 27:4, s. 1746-1756
  • Tidskriftsartikel (refereegranskat)abstract
    • Emerging 5G and future 6G mobile networks are expected to cater for high mobility scenarios ranging from vehicle-to-vehicle communications to unmanned aerial vehicles and airborne platforms. Communications in this type of deployments suffer from severe Doppler shifts which require new modulation waveforms. Orthogonal time frequency space (OTFS) modulation has recently been proposed as a promising technology for coping with high Doppler channels. OTFS converts a time-varying fading channel into a time-independent channel in the two-dimensional delay-Doppler (DD) domain. The transmit symbols are multiplexed into a nearly constant channel with a complex channel gain in the DD domain. In this paper, we consider a high Doppler airborne communication network where relative mobile node speeds can be above 1200 m/s. The considered system represents a mobile ad-hoc network where the airborne mobile nodes can join or leave the network. Furthermore, each node is equipped with an antenna array that supports directed communication among mobile nodes. The Doppler shifts in this airborne communication network are in the order of 52-72 kHz and may potentially be even higher depending on the selected carrier frequency and the relative speed among the airborne platforms. As such, OTFS modulation is used in this work to efficiently compensate for the high Doppler shifts in the DD domain. In particular, a comprehensive performance assessment in terms of bit error rate (BER) is conducted to reveal the potential of OTFS modulation in dealing with such extreme transmission scenarios. The impact of physical layer parameters, number of delay-Doppler bins in the DD domain used for OTFS modulation, directed versus two-ray channels, and the combination of multiple-input multiple-output (MIMO) systems with OTFS modulation on the BER is assessed. It is shown that both OTFS modulation over a two-ray channel as well as MIMO-OTFS modulation provide a reliable airborne communication network with low BER. © 2022, The Author(s).
  •  
5.
  • Cuce, Simon, et al. (författare)
  • Supporting multiple consistency models within a mobility enabled file system using a component based framework
  • 2003
  • Ingår i: Mobile Networks and Applications. - 1383-469X .- 1572-8153. ; 8:4, s. 317-326
  • Tidskriftsartikel (refereegranskat)abstract
    • Most existing Distributed File Systems (DFSs) implement a single consistency model to maintain one-copy equivalence. The functionality of that consistency model is based on a balance between environmental constraints and the targeted level of consistency. Such systems efficiently maintain consistency while the environmental capabilities remain constant, e.g., presuming uninterrupted connectivity. However, when these characteristics change, the inflexible nature of a single consistency model results in its inability to maintain an expected balance between consistency and constraints. This illustrated with existing implementations of DFSs. GLOMAR is a DFS middleware layer that allows application developers to map their specific consistency models to environmental constraints. As a result, multiple consistency models can be created, with each scoped for a particular application and environmental scenario. This paper outlines important aspects of GLOMAR, detailing its implementation and outlining a number of consistency models.
  •  
6.
  •  
7.
  • Feeney, Laura Marie (författare)
  • An energy-consumption model for performance analysis of routing protocols for mobile ad hoc networks
  • 2001. - 1
  • Ingår i: Mobile Networks and Applications. - 1383-469X .- 1572-8153. ; 6:3, s. 239-250
  • Tidskriftsartikel (refereegranskat)abstract
    • A mobile ad hoc network (or manet) is a group of mobile, wireless nodes which co-operatively form a network independent of any fixed infrastructure or centralised administration. In particular, a manet has no base stations: a node communicates directly with nodes within wireless range and indirectly with all other nodes using a dynamically computed, multi-hop route via the other nodes of the manet. Simulation and experimental results are combined to show that energy and bandwidth are substantially different metrics and that resource utilisation in manet routing protocols is not fully addressed by bandwidth-centric analysis. This report presents a model for evaluating the energy consumption behaviour of a mobile ad hoc network. The model was used to examine the energy consumption of two well-known manet routing protocols. Energy-aware performance analysis is shown to provide new insights into costly protocol behaviours and suggests opportunities for improvement at the protocol and link layers.
  •  
8.
  • Forsström, Stefan, et al. (författare)
  • Continuously Changing Information on a Global Scale and its Impact for the Internet-of-Things
  • 2014
  • Ingår i: Mobile Networks and Applications. - : Springer Science and Business Media LLC. - 1383-469X .- 1572-8153. ; 19:1, s. 33-44
  • Tidskriftsartikel (refereegranskat)abstract
    • This article analyzes the challenges of supporting continual changes of context information in Internet-of-Things applications. These applications require a constant flow of continuously changing information from sensor based sources in order to ensure a high quality-of-experience. However, an uncontrolled flow between sources and sinks on a global scale wastes resources, such as computational power, communication bandwidth, and battery time. In response to these challenges we present a general approach which focuses on four layers where we provide a proposed solution to each layer. We have realized the general model into a proof-of-concept implementation running on devices with limited resources, where we can moderate the information exchange based on relevance and sought after quality-of-experience by the applications. In conclusion, we evaluate our solution and present a summary of our experiences regarding the impact of continuously changing information on the Internet-of-Things.
  •  
9.
  • Jiang, Xiaolin, et al. (författare)
  • A Simplified Interference Model for Outdoor Millimeter-waveNetworks
  • 2019
  • Ingår i: Mobile Networks and Applications. - : Springer. - 1383-469X .- 1572-8153. ; 24:3, s. 983-990
  • Tidskriftsartikel (refereegranskat)abstract
    • Industry 4.0 is the emerging trend of the industrial automation. Millimeter-wave (mmWave) communication is a prominent technology for wireless networks to support the Industry 4.0 requirements. The availability of tractable accurate interference models would greatly facilitate performance analysis and protocol development for these networks. In this paper, we investigate the accuracy of an interference model that assumes impenetrable obstacles and neglects the sidelobes. We quantify the error of such a model in terms of statistical distribution of the signal to noise plus interference ratio and of the user rate for outdoor mmWave networks under different carrier frequencies and antenna array settings. The results show that assuming impenetrable obstacle comes at almost no accuracy penalty, and the accuracy of neglecting antenna sidelobes can be guaranteed with sufficiently large number of antenna elements. The comprehensive discussions of this paper provide useful insights for the performance analysis and protocol design of outdoor mmWave networks.
  •  
10.
  •  
11.
  • Karresand, M., et al. (författare)
  • Disk Cluster Allocation Behavior in Windows and NTFS
  • 2020
  • Ingår i: Mobile Networks and Applications. - : Springer. - 1383-469X .- 1572-8153. ; 5:1, s. 248-258
  • Tidskriftsartikel (refereegranskat)abstract
    • The allocation algorithm of a file system has a huge impact on almost all aspects of digital forensics, because it determines where data is placed on storage media. Yet there is only basic information available on the allocation algorithm of the currently most widely spread file system; NTFS. We have therefore studied the NTFS allocation algorithm and its behavior empirically. To do that we used two virtual machines running Windows 7 and 10 on NTFS formatted fixed size virtual hard disks, the first being 64 GiB and the latter 1 TiB in size. Files of different sizes were written to disk using two writing strategies and the $Bitmap files were manipulated to emulate file system fragmentation. Our results show that files written as one large block are allocated areas of decreasing size when the files are fragmented. The decrease in size is seen not only within files, but also between them. Hence a file having smaller fragments than another file is written after the file having larger fragments. We also found that a file written as a stream gets the opposite allocation behavior, i. e. its fragments are increasing in size as the file is written. The first allocated unit of a stream written file is always very small and hence easy to identify. The results of the experiment are of importance to the digital forensics field and will help improve the efficiency of for example file carving and timestamp verification. © 2019, The Author(s).
  •  
12.
  • Khoshkholghi, Mohammad Ali, et al. (författare)
  • Service Function Chain Placement for Joint Cost and Latency Optimization
  • 2020
  • Ingår i: Mobile Networks and Applications. - : Springer. - 1383-469X .- 1572-8153. ; 25:6, s. 2191-2205
  • Tidskriftsartikel (refereegranskat)abstract
    • Network Function Virtualization (NFV) is an emerging technology to consolidate network functions onto high volume storages, servers and switches located anywhere in the network. Virtual Network Functions (VNFs) are chained together to provide a specific network service, called Service Function Chains (SFCs). Regarding to Quality of Service (QoS) requirements and network features and states, SFCs are served through performing two tasks: VNF placement and link embedding on the substrate networks. Reducing deployment cost is a desired objective for all service providers in cloud/edge environments to increase their profit form demanded services. However, increasing resource utilization in order to decrease deployment cost may lead to increase the service latency and consequently increase SLA violation and decrease user satisfaction. To this end, we formulate a multi-objective optimization model to joint VNF placement and link embedding in order to reduce deployment cost and service latency with respect to a variety of constraints. We, then solve the optimization problem using two heuristic-based algorithms that perform close to optimum for large scale cloud/edge environments. Since the optimization model involves conflicting objectives, we also investigate pareto optimal solution so that it optimizes multiple objectives as much as possible. The efficiency of proposed algorithms is evaluated using both simulation and emulation. The evaluation results show that the proposed optimization approach succeed in minimizing both cost and latency while the results are as accurate as optimal solution obtained by Gurobi (5%).
  •  
13.
  • Laya, Andres, et al. (författare)
  • Reliable Machine-to-Machine Multicast Services with Multi-Radio Cooperative Retransmissions
  • 2015
  • Ingår i: Mobile Networks and Applications. - : Springer-Verlag New York. - 1383-469X .- 1572-8153. ; 20:6, s. 734-744
  • Tidskriftsartikel (refereegranskat)abstract
    • The 3GPP is working towards the definition of service requirements and technical solutions to provide support for energy-efficient Machine Type Communications (MTC) in the forthcoming generations of cellular networks. One of the envisioned solutions consists in applying group management policies to clusters of devices in order to reduce control signaling and improve upon energy efficiency, e.g., multicast Over-The-Air (OTA) firmware updates. In this paper, a Multi-Radio Cooperative Retransmission Scheme is proposed to efficiently carry out multicast transmissions in MTC networks, reducing both control signaling and improving energy-efficiency. The proposal can be executed in networks composed by devices equipped with multiple radio interfaces which enable them to connect to both a cellular access network, e.g., LTE, and a short-range MTC area network, e.g., Low-Power Wi-Fi or ZigBee, as foreseen by the MTC architecture defined by ETSI. The main idea is to carry out retransmissions over the M2M area network upon error in the main cellular link. This yields a reduction in both the traffic load over the cellular link and the energy consumption of the devices. Computer-based simulations with ns-3 have been conducted to analyze the performance of the proposed scheme in terms of energy consumption and assess its superior performance compared to non-cooperative retransmission schemes, thus validating its suitability for energy-constrained MTC applications.
  •  
14.
  • Leung, Victor C. M., et al. (författare)
  • Editorial for QShine 2014 Special Issue
  • 2016
  • Ingår i: Mobile Networks and Applications. - : Springer Science and Business Media LLC. - 1383-469X .- 1572-8153. ; 21:3, s. 387-389
  • Tidskriftsartikel (övrigt vetenskapligt/konstnärligt)
  •  
15.
  • Liang, Bei, 1985, et al. (författare)
  • Decentralised Functional Signatures
  • 2019
  • Ingår i: Mobile Networks and Applications. - : Springer Science and Business Media LLC. - 1572-8153 .- 1383-469X. ; 24:3, s. 934-946
  • Tidskriftsartikel (refereegranskat)abstract
    • With the rapid development of the Internet of Things (IoT) a lot of critical information is shared however without having guarantees about the origin and integrity of the information. Digital signatures can provide important integrity guarantees to prevent illegal users from getting access to private and sensitive data in various IoT applications. Functional signatures, introduced by Boyle, Goldwasser and Ivan (PKC 2014) as signatures with a finegrained access control, allow an authority to generate signing keys corresponding to various functions such that a user with a signing key for a function f, can sign the image of the function f on a message mi.e., can sign f(m). Okamoto and Takashima (PKC 2013) firstly proposed the notion of a decentralized multi-authority functional signature (DMA-FS) scheme, which supports non-monotone access structures combined with inner-product relations. In this paper, we generalise the definition of DMA-FS proposed by Okamoto et al. (PKC13) for even more general policy functions, which support any polynomial-size boolean predicates other than the inner product relation and allow modifications of the original message. In our multi-authority functional signature (MAFS), there are multiple authorities and each one is able to certify a specific function and issue a corresponding functional signing key for each individual with some property, rendering them very useful in application settings such smart homes, smart cities, smart health care etc. We also provide a general transformation from a standard signature scheme to a MAFS scheme. Moreover, we present a way to build a function private MAFS from a FS without function privacy together with SNARKs.
  •  
16.
  •  
17.
  • Lindgren, Anders, et al. (författare)
  • Quality of Service Schemes for IEEE 802.11 Wireless LANs – An Evaluation
  • 2003
  • Ingår i: Mobile Networks and Applications. - 1383-469X .- 1572-8153. ; 8:3, s. 223-235
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper evaluates four mechanisms for providing service differentiation in IEEE 802.11 wireless LANs. The evaluated schemes are the Point Coordinator Function (PCF) of IEEE 802.11, the Enhanced Distributed Coordinator Function (EDCF) of the proposed IEEE 802.11e extension to IEEE 802.11, Distributed Fair Scheduling (DFS), and Blackburst. The evaluation was done using the ns-2 simulator. Furthermore, the impact of some parameter settings on performance has also been investigated. The metrics used in the evaluation are throughput, medium utilization, collision rate, average access delay, and delay distribution for a variable load of real time and background traffic. The simulations show that the best performance is achieved by Blackburst. PCF and EDCF are also able to provide pretty good service differentiation. DFS can give a relative differentiation and consequently avoids starvation of low priority traffic.
  •  
18.
  • Lv, Zhihan, Dr. 1984-, et al. (författare)
  • Editorial : 5G for Augmented Reality
  • 2022
  • Ingår i: Mobile Networks and Applications. - : Springer. - 1383-469X .- 1572-8153.
  • Tidskriftsartikel (refereegranskat)
  •  
19.
  • Nhan Vo, Van, et al. (författare)
  • Secrecy Performance in the Internet of Things : Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers
  • 2020
  • Ingår i: Software, practice & experience. - Sweden : Springer. - 0038-0644 .- 1097-024X. ; 25:1, s. 193-210
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN’s power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.
  •  
20.
  • Olsson, Daniel, et al. (författare)
  • MEP - A media event platform
  • 2002
  • Ingår i: Mobile Networks and Applications. - 1383-469X .- 1572-8153. ; 7:3, s. 235-244
  • Tidskriftsartikel (refereegranskat)abstract
    • Popular media events of today are likely to attract a big, live audience. Being part of a huge cricket audience, for example, knowing that the event is broadcast to perhaps millions of people, is a truly arousing experience. But the size of the audience and the complexity of events do not come without drawbacks. Spectators find it difficult to be at the right spot at the right time and to grasp the essentials of the on goings. We introduce a Media Event Platform, which combines various sources of event crucial information and lets the mobile user choose from a number of different channels; WAP-phones, web browsers, digital radio, and SMS. This paper adds to the existing body of research by offering a novel multi channel system design for boosting event experiences and provides an early example of how mobile technology influences converging media forms. Further, we report from a user evaluation conducted in order to find implications for design improvements, and describe possible commercial potential.
  •  
21.
  •  
22.
  • Pamuklu, Turgay, et al. (författare)
  • Renewable Energy Assisted Function Splitting in Cloud Radio Access Networks
  • 2020
  • Ingår i: Mobile Networks and Applications. - : Springer. - 1383-469X .- 1572-8153. ; 25:5, s. 2012-2023
  • Tidskriftsartikel (refereegranskat)abstract
    • Cloud-Radio Access Network (C-RAN) is a promising network architecture to reduce energy consumption and the increasing number of base station deployment costs in mobile networks. However, the necessity of enormous fronthaul bandwidth between a remote radio head and a baseband unit (BBU) calls for novel solutions. One of the solutions introduces the edge-cloud layer in addition to the centralized cloud (CC) to keep resources closer to the radio units (RUs). Then, split the BBU functions between the center cloud (CC) and edge clouds (ECs) to reduce the fronthaul bandwidth requirement and to relax the stringent end-to-end delay requirements. This paper expands this architecture by combining it with renewable energy sources in CC and ECs. We explain this novel system and formulate a mixed-integer linear programming (MILP) problem, which aims to reduce the operational expenditure of this system. Due to the NP-Hard property of this problem, we solve the smaller instances by using a MILP Solver and provide the results in this paper. Moreover, we propose a faster online heuristic to find solutions for high user densities. The results show that make splitting decisions by considering renewable energy provides more cost-effective solutions to mobile network operators (MNOs). Lastly, we provide an economic feasibility study for renewable energy sources in a CRAN architecture, which will encourage the MNOs to use these sources in this architecture.
  •  
23.
  • Sankararaman, Swaminathan, et al. (författare)
  • Optimization schemes for protective jamming
  • 2014
  • Ingår i: Mobile Networks and Applications. - : Springer Science and Business Media LLC. - 1383-469X .- 1572-8153. ; 19:1, s. 45-60
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identication, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, sensor networks, etc. By carefully managing jammers to produce noise, we show how to reduce the SINR of eavesdroppers to below a threshold for successful reception, without jeopardizing network performance. We present algorithms targeted towards optimizing power allocation and number of jammers needed in several settings. Experimental simulations back up our results.
  •  
24.
  • Shu, Zhaogang, et al. (författare)
  • Security in Software-Defined Networking : Threats and Countermeasures
  • 2016
  • Ingår i: Mobile Networks and Applications. - : Springer Science and Business Media LLC. - 1383-469X .- 1572-8153. ; 21:5, s. 764-776
  • Tidskriftsartikel (refereegranskat)abstract
    • In recent years, Software-Defined Networking (SDN) has been a focus of research. As a promising network architecture, SDN will possibly replace traditional networking, as it brings promising opportunities for network management in terms of simplicity, programmability, and elasticity. While many efforts are currently being made to standardize this emerging paradigm, careful attention needs to be also paid to security at this early design stage. This paper focuses on the security aspects of SDN. We begin by discussing characteristics and standards of SDN. On the basis of these, we discuss the security features as a whole and then analyze the security threats and countermeasures in detail from three aspects, based on which part of the SDN paradigm they target, i.e., the data forwarding layer, the control layer and the application layer. Countermeasure techniques that could be used to prevent, mitigate, or recover from some of such attacks are also described, while the threats encountered when developing these defensive mechanisms are highlighted.
  •  
25.
  •  
26.
  • Tan, Cheng Lin, et al. (författare)
  • MobiCast: A multicast scheme for wireless networks
  • 2000
  • Ingår i: Mobile Networks and Applications. - 1383-469X .- 1572-8153. ; 5:4, s. 259-271
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we propose a multicast scheme known as MobiCast that is suitable for mobile hosts in an internetwork environment with small wireless cells. Our scheme adopts a hierarchical mobility management approach to isolate the mobility of the mobile hosts from the main multicast delivery tree. Each foreign domain has a domain foreign agent. We have simulated our scheme using the Network Simulator and the measurements show that our multicast scheme is effective in minimizing disruptions to a multicast session due to the handoffs of the mobile group member, as well as reducing packet loss when a mobile host crosses cell boundaries during a multicast session
  •  
27.
  • Vo, Van Nhan, et al. (författare)
  • Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions
  • 2020
  • Ingår i: Mobile Networks and Applications. - : SPRINGER. - 1383-469X .- 1572-8153. ; 25:1, s. 23-41
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we investigate radio frequency (RF) energy harvesting (EH) in wireless sensor networks (WSNs) using non-orthogonal multiple access (NOMA) uplink transmission with regard to a probable secrecy outage during the transmission between sensor nodes (SNs) and base station (BS) in the presence of eavesdroppers (EAVs). In particular, the communication protocol is divided into two phases: 1) first, the SNs harvest energy from multiple power transfer stations (PTSs), and then, 2) the cluster heads are elected to transmit information to the BS using the harvested energy. In the first phase, we derive a 2D RF energy model to harvest energy for the SNs. During the second phase, the communication faces multiple EAVs who attempt to capture the information of legitimate users; thus, we propose a strategy to select cluster heads and implement the NOMA technique in the transmission of the cluster heads to enhance the secrecy performance. For the performance evaluation, the exact closed-form expressions for the secrecy outage probability (SOP) at the cluster heads are derived. A nearly optimal EH time algorithm for the cluster head is also proposed. In addition, the impacts of system parameters, such as the EH time, the EH efficiency coefficient, the distance between the cluster heads and the BS, and the number of SNs as well as EAVs on the SOP, are investigated. Finally, Monte Carlo simulations are performed to show the accuracy of the theoretical analysis; it is also shown that the secrecy performance of NOMA in RF EH WSN can be improved using the optimal EH time.
  •  
28.
  • Wan, Shaohua, et al. (författare)
  • Deep Learning Models for Real-time Human Activity Recognition with Smartphones
  • 2020
  • Ingår i: Mobile Networks and Applications. - : Springer. - 1383-469X .- 1572-8153. ; 25:2, s. 743-755
  • Tidskriftsartikel (refereegranskat)abstract
    • With the widespread application of mobile edge computing (MEC), MEC is serving as a bridge to narrow the gaps between medical staff and patients. Relatedly, MEC is also moving toward supervising individual health in an automatic and intelligent manner. One of the main MEC technologies in healthcare monitoring systems is human activity recognition (HAR). Built-in multifunctional sensors make smartphones a ubiquitous platform for acquiring and analyzing data, thus making it possible for smartphones to perform HAR. The task of recognizing human activity using a smartphone's built-in accelerometer has been well resolved, but in practice, with the multimodal and high-dimensional sensor data, these traditional methods fail to identify complicated and real-time human activities. This paper designs a smartphone inertial accelerometer-based architecture for HAR. When the participants perform typical daily activities, the smartphone collects the sensory data sequence, extracts the high-efficiency features from the original data, and then obtains the user's physical behavior data through multiple three-axis accelerometers. The data are preprocessed by denoising, normalization and segmentation to extract valuable feature vectors. In addition, a real-time human activity classification method based on a convolutional neural network (CNN) is proposed, which uses a CNN for local feature extraction. Finally, CNN, LSTM, BLSTM, MLP and SVM models are utilized on the UCI and Pamap2 datasets. We explore how to train deep learning methods and demonstrate how the proposed method outperforms the others on two large public datasets: UCI and Pamap2.
  •  
29.
  • Xiang, Zhengzhe, et al. (författare)
  • Dynamical Service Deployment and Replacement in Resource-Constrained Edges
  • 2019
  • Ingår i: Mobile Networks and Applications. - New York, USA : Springer. - 1383-469X .- 1572-8153. ; 25, s. 674-689
  • Tidskriftsartikel (refereegranskat)abstract
    • With the rapid development of mobile computing technology, more and more complex tasks are now able to be fulfilled on users’ mobile devices with an increasing number of novel services. However, the development of mobile computing is limited by the latency brought by unstable wireless network and the computation failure caused by the constrained resources of mobile devices. Therefore, people turn to establish a service provisioning system based on mobile edge computing (MEC) model to solve this problem. With the help of services deployed on edge servers, the latency can be reduced and the computation can be offloaded. Though the edge servers have more available resources than mobile devices, they are still resource-constrained, so they must carefully choose the services for deployment. In this paper, we focus on improving performance of the service provisioning system by deploying and replacing services on edge servers. Firstly, we design and implement a prototype of service provisioning system that simulates the behaviors between users and servers. Secondly, we propose an approach to deploy services on edge servers before the launching of these servers, and propose an approach to replace services on edge servers dynamically. Finally, we conduct a series of experiments to evaluate the performance of our approaches. The result shows that our approach can improve the performance of service provisioning systems.
  •  
30.
  •  
31.
  • Yin, Tao, et al. (författare)
  • Optimal Extraction Method of Feature Points in Key Frame Image of Mobile Network Animation
  • 2022
  • Ingår i: Mobile Networks and Applications. - : Springer Nature. - 1383-469X .- 1572-8153. ; 27:6, s. 2515-2523
  • Tidskriftsartikel (refereegranskat)abstract
    • In order to effectively extract the feature points of mobile network animation images and accurately reflect the main content of the video, an optimization method to extract the feature points of key frame images of mobile network animation is proposed. Firstly, the key frames are selected according to the content change degree of the animation video. The scale invariant feature transformation algorithm is used to describe the feature points of the key frame image of the animation video. The local feature points of the image are estimated by the constraint optimization method to realize the optimization extraction of the feature points of the key frame image of the mobile network animation. The efficiency of feature points extraction is analyzed from the number and effectiveness of feature points extraction, time-consuming and similarity invariance of feature points. The experimental results show that the proposed method has excellent adaptability, and can effectively extract feature points of mobile network animation image.
  •  
32.
  • Yu, Xixun, et al. (författare)
  • Survey of Verifiable Computation
  • 2017
  • Ingår i: Mobile Networks and Applications. - : Springer. - 1383-469X .- 1572-8153. ; 22:3, s. 438-453
  • Tidskriftsartikel (refereegranskat)abstract
    • Internet of Things (IoT) has taken place to motivate various intelligent applications with the data collected by the things”. Meanwhile, Cloud computing offers an efficient and convenient way to store, process and analyze huge amount of data. Because a Cloud Service Provider (CSP) that is employed to store and process user private data is actually not in the trust domains of cloud users, data security becomes a serious issue in cloud computing. One crucial problem in cloud is the cloud data processing result may be incorrect, thus cannot be fully trusted. This calls for research to verify the correctness of data processing at the cloud in order to enhance its trustworthiness, especially for encrypted data processing. At present, various cryptosystems have been proposed to achieve verifiability with different characteristics and quality. However, the literature still lacks a thorough survey to review the current state of art in order to get a comprehensive view of this research field, named verifiable computation. In this paper, we review existing work of verifiable computation by comparing and discussing pros and cons according to performance requirements, highlight open research issues through serious review and analysis and propose a number of research directions in order to guide future research
  •  
33.
  •  
34.
  • Zhang, H., et al. (författare)
  • Improve the Security of Industrial Control System : A Fine-Grained Classification Method for DoS Attacks on Modbus/TCP
  • 2023
  • Ingår i: Mobile Networks and Applications. - : Springer. - 1383-469X .- 1572-8153.
  • Tidskriftsartikel (refereegranskat)abstract
    • With the rapid development of technology, more malicious traffic data brought negative influences on industrial areas. Modbus protocol plays a momentous role in the communications of Industrial Control Systems (ICS), but it’s vulnerable to Denial of Service attacks(DoS). Traditional detection methods cannot perform well on fine-grained detection tasks which could contribute to locating targets of attacks and preventing the destruction. Considering the temporal locality and high dimension of malicious traffic, this paper proposed a Neural Network architecture named MODLSTM, which consists of three parts: input preprocessing, feature recoding, and traffic classification. By virtue of the design, MODLSTM can form continuous stream semantics based on fragmented packets, discover potential low-dimensional features and finally classify traffic at a fine-grained level. To test the model’s performances, some experiments were conducted on industrial and public datasets, and the models achieved excellent performances in comparison with previous work(accuracy increased by 0.71% and 0.07% respectively). The results show that the proposed method has more satisfactory abilities to detect DoS attacks related to Modbus, compared with other works. It could help to build a reliable firewall to address a variety of malicious traffic in diverse situations, especially in industrial environments. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
  •  
35.
  • Zhang, Ke, et al. (författare)
  • Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks
  • 2019
  • Ingår i: Mobile Networks and Applications. - New York, NY : Springer-Verlag New York. - 1383-469X .- 1572-8153. ; 24:3, s. 1003-1014
  • Tidskriftsartikel (refereegranskat)abstract
    • Mobile Edge Computing (MEC) is a promising solution to improve vehicular services through offloading computation to cloud servers in close proximity to mobile vehicles. However, the self-interested nature together with the high mobility characteristic of the vehicles make the design of the computation offloading scheme a significant challenge. In this paper, we propose a new Vehicular Edge Computing (VEC) framework to model the computation offloading process of the mobile vehicles running on a bidirectional road. Based on this framework, we adopt a contract theoretic approach to design optimal offloading strategies for the VEC service provider, which maximize the revenue of the provider while enhancing the utilities of the vehicles. To further improve the utilization of the computing resources of the VEC servers, we incorporate task priority distinction as well as additional resource providing into the design of the offloading scheme, and propose an efficient VEC server selection and computing resource allocation algorithm. Numerical results indicate that our proposed schemes greatly enhance the revenue of the VEC provider, and concurrently improve the utilization of cloud computing resources. © 2018, Springer Science+Business Media, LLC, part of Springer Nature.
  •  
36.
  • Liu, George Y., et al. (författare)
  • A class of mobile motion prediction algorithms for wireless mobile computing and communications
  • 1996
  • Ingår i: Mobile Networks and Applications. - Netherlands : Springer. - 1383-469X. ; 1:2, s. 113-121
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper describes a class of novel mobile motion prediction algorithms for supporting global mobile data accessing. Traditionally, mobility and routing management includes functions to passively keep track of the location of the users/terminals and to maintain connections to the terminals belonging to the system. To maintain uninterrupted high-quality service for distributed applications, it is important that a mobile system be more intelligent and can anticipate the change of the location of its user. We propose an aggressive mobility and routing management scheme, called predictive mobility management. A class of mobile motion prediction algorithms predicts the future location of a mobile user according to the user's movement history, i.e., previous movement patterns. By combining this scheme with mobility agent functions, the service and user routing data are actually pre-connected and pre-assigned at the locations to which the user is moving. Thus, the user can immediately receive service or data with virtually the same efficiency as at the previous location, i.e., without encountering a large "data structure handover" delay before service or data is available.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-36 av 36
Typ av publikation
tidskriftsartikel (36)
Typ av innehåll
refereegranskat (31)
övrigt vetenskapligt/konstnärligt (5)
Författare/redaktör
Vinel, Alexey, 1983- (3)
Vasilakos, Athanasio ... (3)
Taheri, Javid (2)
Zaslavsky, Arkady (2)
Lv, Zhihan, Dr. 1984 ... (2)
Zhang, Yan (1)
visa fler...
Li, Y. (1)
Zhang, H. (1)
Liu, S. (1)
Song, H. (1)
Deng, S. (1)
Singh, K. (1)
Yang, X. (1)
Nilsson, Andreas (1)
Fischione, Carlo (1)
Mitrokotsa, Aikateri ... (1)
Kassler, Andreas, 19 ... (1)
Bhamare, Deval (1)
Almquist, Andreas (1)
Zomaya, Albert (1)
Chu, Thi My Chinh (1)
Zepernick, Hans-Juer ... (1)
Maguire Jr., Gerald ... (1)
Pink, Stephen (1)
Lindgren, Anders (1)
Cavdar, Cicek, 1977- (1)
Imran, Muhammad Al (1)
Gokan Khan, Michel (1)
Deng, Shuiguang (1)
Dán, György (1)
Alam, Muhammad (1)
Schiller, Elad, 1974 (1)
Shu, Lei (1)
Wu, Xiaoling (1)
Hernandez Jayo, Unai (1)
Kunz, Andreas (1)
Axelsson, Stefan, 19 ... (1)
Ersoy, Cem (1)
Schelén, Olov (1)
Alizadeh Noghani, Ky ... (1)
Efrat, Alon (1)
Polishchuk, Valentin (1)
Brown, Barry (1)
Kumar, Vijay (1)
Anderson, Ian (1)
Maitland, Julie (1)
Sherwood, Scott (1)
Barkhuus, Louise (1)
Chalmers, Matthew (1)
Hall, Malcolm (1)
visa färre...
Lärosäte
Luleå tekniska universitet (8)
Kungliga Tekniska Högskolan (6)
Uppsala universitet (4)
Högskolan i Halmstad (4)
Stockholms universitet (2)
Mälardalens universitet (2)
visa fler...
Mittuniversitetet (2)
Chalmers tekniska högskola (2)
RISE (2)
Karlstads universitet (2)
Umeå universitet (1)
Linköpings universitet (1)
Blekinge Tekniska Högskola (1)
visa färre...
Språk
Engelska (36)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (24)
Teknik (15)
Medicin och hälsovetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy