Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Mobile" wg kryterium: Temat


Tytuł:
Adaptive handover control in IP-based mobility networks
Autorzy:
Park, T.
Dadej, A.
Powiązania:
https://bibliotekanauki.pl/articles/307727.pdf
Data publikacji:
2003
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
mobile networking
Mobile IP
handover performance
adaptive handover control
Opis:
In this paper, we propose framework for an adaptive handover control architecture (AHCA), which aims at enhancing overall IP handover performance while maximising utilisation of resources in wireless access networks. The IP handover procedures in the AHCA adapt dynamically to network conditions, as well as to a wide range of user profiles and application quality of service (QoS) requirements. To confirm our expectations that the AHCA will bring performance benefits in heterogeneous mobile IP networking environment, we have investigated basic performance characteristics of different handover mechanisms. The preliminary simulation results demonstrate that the AHCA will bring significant performance improvements as compared with non adaptive IP handovers.
Źródło:
Journal of Telecommunications and Information Technology; 2003, 2; 62-70
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mobile Cloud for Parallel and Distributed Green Computing
Autorzy:
Siwik, L.
Kala, D.
Godzik, M.
Turek, W.
Byrski, A.
Kisiel-Dorohinicki, M.
Powiązania:
https://bibliotekanauki.pl/articles/308894.pdf
Data publikacji:
2017
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
distributed computing
green computing
mobile cloud
mobile computing
parallel computing
pervasive computing
Opis:
Mobile Computing and Mobile Cloud Computing are the areas where intensive research is observed. The “mobility” landscape (devices, technologies, apps, etc.) evolves so fast that definitions and taxonomies do not catch up with so dynamic changes and there is still an ambiguity in definitions and common understanding of basic ideas and models. This research focuses on Mobile Cloud understood as parallel and distributed system consisting of a collection of interconnected (and virtualized) mobile devices dynamically provisioned and presented as one unified computing resource. This paper focuses on the mobile green computing cloud applied for parallel and distributed computations and consisting of outdated, abandoned or no longer needed smartphones being able to set up a powerful computing cluster. Besides showing the general idea and background, an actual computing cluster is constructed and its scalability and efficiency is checked versus the results obtained from the virtualized set of smartphones. All the experiments are performed using a dedicated software framework constructed in order to leverage the nolonger-needed smartphones, creating a computing cloud.
Źródło:
Journal of Telecommunications and Information Technology; 2017, 4; 60-70
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Method of Mobile Base Station Placement for High Altitude Platform Based Network with Geographical Clustering of Mobile Ground Nodes
Autorzy:
Song, H. Y.
Powiązania:
https://bibliotekanauki.pl/articles/308966.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
clustering geographical
mobile base stations
Opis:
High altitude platforms (HAPs) such as unmanned aerial vehicles (UAVs) which can be deployed as stratospheric infrastructures enable a sort of new configurations of wireless networks. Ground nodes must be clustered in multiple sets and one dedicated UAV is assigned to each set and act as an mobile base station (MBS). For the intra-set nodes, UAVs must communicate each other in order to establish network links among intra-set nodes. Here we find a geographical clustering problem of networking nodes and a placement problem of MBSs. The clustering technique of mobile ground nodes can identify the geographical location of MBSs as well as the coverage of MBSs. In this paper we proposed a clustering mechanism to build such a configuration and the effectiveness of this solution is demonstrated by simulation. For a selected region with a relatively big island, we modeled mobile ground nodes and showed the result of dynamic placement of MBSs by our clustering algorithm. The final results will be shown graphically with the mobility of ground nodes as well as the placement of MBSs.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 2; 22-33
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Recent developments in mobile cloud scheduling: state-of-the-art, challenges and perspectives
Autorzy:
Smelcerz, K.
Powiązania:
https://bibliotekanauki.pl/articles/307984.pdf
Data publikacji:
2013
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
energy awareness
mobile cloud computing
scheduling
Opis:
Cloud computing became recently one of the most popular multi-layer distributed computational and data processing environments with various types of services, distributed data storages and resources. With rapid development of mobile technologies, computational clouds have been transformed into the systems with dynamically changing topology and flexible infrastructure through integration with the mobile devices and mobile users as the whole system nodes and actors. The aim of this paper is to provide a comprehensive study and critical comparative analysis of the recent developments in the Mobile Clouds with a new energy optimization criterion scheduling.
Źródło:
Journal of Telecommunications and Information Technology; 2013, 4; 51-57
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Evaluation of Reliability of Mobile ICT Services
Autorzy:
Kowalewski, Marian
Kobus, Ryszard
Sędek, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/1839472.pdf
Data publikacji:
2021
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
reliability
ICT mobile services
user satisfaction
Opis:
This article discusses common problems with reliability and availability of ICT services, mainly in mobile networks. Internet access-related services have been examined and traditional service quality assessment methods have been compared with the proposed solutions, with the primary focus placed on availability and reliability of mobile services. The required parameter values describing reliability and quality levels have been defined and proposed.
Źródło:
Journal of Telecommunications and Information Technology; 2021, 1; 37-42
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Evaluation of Reliability of Mobile ICT Services
Autorzy:
Kowalewski, Marian
Kobus, Ryszard
Sędek, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/1839488.pdf
Data publikacji:
2021
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
reliability
ICT mobile services
user satisfaction
Opis:
This article discusses common problems with reliability and availability of ICT services, mainly in mobile networks. Internet access-related services have been examined and traditional service quality assessment methods have been compared with the proposed solutions, with the primary focus placed on availability and reliability of mobile services. The required parameter values describing reliability and quality levels have been defined and proposed.
Źródło:
Journal of Telecommunications and Information Technology; 2021, 1; 37-42
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Evaluation of potential dangers of Mobile Telecommunication frequencies and modulations
Autorzy:
Bamisaye, A. J.
Powiązania:
https://bibliotekanauki.pl/articles/307594.pdf
Data publikacji:
2013
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
electromagnetic fields
frequency
health
mobile communication
modulation
Opis:
Mobile Telecommunication is one of the fastest growing technologies in the world. The effects of its high frequencies and complex modulations to the exposed population are considered in this paper. Experimental studies examining a variety of effects on all levels of the organism, ranging from effects on single cells to effects which manifest themselves as reactions of the entire body, there have been a number of epidemiological studies in order to establish the possible causal correlations between higher exposures to HF EMFs. Recommendations on the reduction of the effects of EMFs of Mobile Telecommunication on humans was presented.
Źródło:
Journal of Telecommunications and Information Technology; 2013, 2; 30-34
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Implementation of a Malicious Traffic Filter Using Snort and Wireshark as a Proof of Concept to Enhance Mobile Network Security
Autorzy:
Afzal, Rafia
Murugesan, Raja Kumar
Powiązania:
https://bibliotekanauki.pl/articles/2058503.pdf
Data publikacji:
2022
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
mobile network
signaling network security
SS7
Opis:
In the 1970s, roaming interconnections for cellular networks were designed for a few trusted parties. Hence, security was not a major concern. Today, the SS7 (Signaling System no. 7) solution that is several decades old is still used for many roaming interconnections. SS7 has been proven vulnerable to serious threats due to deregulation, expansion, and convergence with IP-based Long Term Evolution (LTE) networks. The limitations of the SS7 network that it is unable to check the subscriber’s authentic location, verify their identity and filter illegitimate messages, makes the system vulnerable to attacks. Adversaries taking advantage of these shortcomings can inflict threats such as interception of calls and text messages, subscriber tracking and denial of service attacks. Although LTE and Diameter signaling protocols promise enhanced security keeping up with the latest attack vectors, their inherent flaws related to roaming interconnections are still there and continue to make the networks vulnerable. Hence, a highly secure signaling network is required to protect the operators and the subscribers from a diverse range of security attacks. SS7 network protocol layers, such as signaling connection control part (SCCP), transaction capabilities application part (TCAP), and global system for mobile Communications – mobile application part (GSM MAP), manage connectivity between networks and subscribers. An analysis of the parameters of these layers may provide a clear insight into any anomalies present. Unfortunately, these parameters are not validated and verified at the network’s edge. The major contribution of this research is a methodology for detecting anomalies by checking malformed parameters and intra-layer parameter discrepancies at the abovementioned protocol layers. This paper provides an insight into the severity of SS7 network security vulnerabilities. Furthermore, it provides a proof of concept for the analysis of SS7 network traffic using the Wireshark packet capture tool and the Snort intrusion detection system (IDS) capable of detecting malicious traffic patterns.
Źródło:
Journal of Telecommunications and Information Technology; 2022, 1; 64--71
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Adaptive distributed data storage for context-aware applications
Autorzy:
Burceanu, E.
Dobre, C.
Cristea, V.
Powiązania:
https://bibliotekanauki.pl/articles/307763.pdf
Data publikacji:
2013
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
BlobSeer
broker
context
distributed
mobile devices communication
Opis:
Context-aware computing is a paradigm that relies on the active use of information coming from a variety of sources, ranging from smartphones to sensors. The paradigm usually leads to storing large volumes of data that need to be processed to derive higher-level context information. The paper presents a cloud-based storage layer for managing sensitive context data. To handle the storage and aggregation of context data for context-aware applications, Clouds are perfect candidates. But a Cloud platform for context-aware computing needs to cope with several requirements: high concurrent access (all data needs to be available to potentially a large number of users), mobility support (such platform should actively use the caches on mobile devices whenever possible, but also cope with storage size limitations), real-time access guarantees – local caches should be located closer to the end-user whenever possible, and persistency (for traceability, a history of the context data should remain available). BlobSeer, a framework for Cloud data storage, is a perfect candidate for storing context data for large-scale applications. It offers capabilities such as persistency, concurrency and support for flexible storage schema requirement. On top of BlobSeer, Context Aware Framework is designed as an extension that offers context-aware data management to higherlevel applications, and enables scalable high-throughput under high-concurrency. On a logical level, the most important capabilities offered by Context Aware Framework are transparency, support for mobility, real-time guarantees and support for access based on meta-information. On the physical layer, the most important capability is persistent Cloud storage.
Źródło:
Journal of Telecommunications and Information Technology; 2013, 4; 58-69
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Usability Analysis of a Novel Biometric Authentication Approach for Android-Based Mobile Devices
Autorzy:
Conti, V.
Collotta, M.
Pau, G.
Vitabile, S.
Powiązania:
https://bibliotekanauki.pl/articles/309359.pdf
Data publikacji:
2014
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
fingerprints authentication
mobile device security
operating system
usability
Opis:
Mobile devices are widely replacing the standard personal computers thanks to their small size and userfriendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising. This makes them potential targets of malicious network hackers. The use of simple passwords or PIN are not sufficient to provide a suitable security level for those applications requiring high protection levels on data and services. In this paper a biometric authentication system, as a running Android application, has been developed and implemented on a real mobile device. A system test on real users has been also carried out in order to evaluate the human-machine interaction quality, the recognition accuracy of the proposed technique, and the scheduling latency of the operating system and its degree of acceptance. Several measures, such as system usability, users satisfaction, and tolerable speed for identification, have been carried out in order to evaluate the performance of the proposed approach.
Źródło:
Journal of Telecommunications and Information Technology; 2014, 4; 34-43
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber-security for Mobile Service Robots – Challenges for Cyber-physical System Safety
Autorzy:
Dudek, Wojciech
Szynkiewicz, Wojciech
Powiązania:
https://bibliotekanauki.pl/articles/308055.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cyber-security
mobile robot safety
robot
robot threats
Opis:
A review of the known and an indication of the new threats for cyber-physical robotic systems, caused by cybernetic attacks, serves, in this paper, as a basis for the analysis of the known methods relied upon to detect and mitigate consequences of such attacks. A particular emphasis is placed on threats specific for cyber-physical systems, as they are a feature distinguishing these systems from their traditional Information and Communication Technologies (ICT) counterparts. Based on the review of literature and own analyses, unresolved issues regarding the cyber-security of robot systems are presented and discussed.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 2; 29-36
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cross-spectral Iris Recognition for Mobile Applications using High-quality Color Images
Autorzy:
Trokielewicz, M.
Bartuzi, E.
Powiązania:
https://bibliotekanauki.pl/articles/309349.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
biometrics
cross-spectral
iris recognition
mobile technologies
smartphones
Opis:
With the recent shift towards mobile computing, new challenges for biometric authentication appear on the horizon. This paper provides a comprehensive study of cross-spectral iris recognition in a scenario, in which high quality color images obtained with a mobile phone are used against enrollment images collected in typical, near-infrared setups. Grayscale conversion of the color images that employs selective RGB channel choice depending on the iris coloration is shown to improve the recognition accuracy for some combinations of eye colors and matching software, when compared to using the red channel only, with equal error rates driven down to as low as 2%. The authors are not aware of any other paper focusing on cross-spectral iris recognition is a scenario with near-infrared enrollment using a professional iris recognition setup and then a mobile-based verication employing color images.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 3; 91-97
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On-demand QoS and Stability Based Multicast Routing in Mobile Ad Hoc Networks
Autorzy:
Basarkod, P. I.
Manvi, S. S.
Powiązania:
https://bibliotekanauki.pl/articles/308940.pdf
Data publikacji:
2014
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
mobile ad hoc network
mobility
multicast routing
QoS
stability
Opis:
Finding a connection path that remains stable for suciently longer period is critical in mobile ad hoc networks due to frequent link breaks. In this paper, an on-demand Quality of Service (QoS) and stability based multicast routing (OQSMR) scheme is proposed, which is an extension of ad hoc on-demand multicast routing protocol (ODMRP) to provide QoS support for real time applications. The scheme works as follows. Each node in the network periodically estimates the parameters, i.e., node and link stability factor, bandwidth availability, and delays. Next step is creation of neighbor stability and QoS database at every node by using estimated parameters. The last sequence is multicast path construction by using, route request and route reply packets, and QoS and stability information, i.e., link/node stability factor, bandwidth and delays in route information cache of nodes, and performing route maintenance in case of node mobility and route failures. The simulation results indicate that proposed OQSMR demonstrates reduction in packet overhead, improvement in Packet Delivery Ratio (PDR), and reduction in end-to-end delays as compared to ODMRP, and Enhanced ODMRP (E-ODMRP).
Źródło:
Journal of Telecommunications and Information Technology; 2014, 3; 98-112
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Parallel and Distributed Simulation of Ad Hoc Networks
Autorzy:
Sikora, A.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309034.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
ad hoc networks
distributed simulation
mobile network
software systems
Opis:
Modeling and simulation are traditional methods used to evaluate wireless network design. This paper addresses issues associated with the application of parallel discrete event simulation to mobile ad hoc networks design and analysis. The basic characteristics and major issues pertaining to ad hoc networks modeling and simulation are introduced. The focus is on wireless transmission and mobility models. Particular attention is paid to the MobASim system, a Javabased software environment for parallel and distributed simulation of mobile ad hoc networks. We describe the design, performance and possible applications of presented simulation software.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 3; 76-84
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Transmission of Disaster Warnings via Control Channels in Cellular Networks
Autorzy:
Aal-Nouman, Mohammed I.
Abdullah, Osamah
Salman, Omar Hussein
Al-Shaikhli, Noor Qusay A.
Powiązania:
https://bibliotekanauki.pl/articles/1839317.pdf
Data publikacji:
2020
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
control channel
disaster reduction
early warning message
mobile network
Opis:
According to United Nations reports, natural disasters caused, worldwide, approximately 100,000 deaths and affected 175 million people each year between 2004 and 2013. To reduce those numbers, countries around the globe have made specific arrangements enabling them to warn the population about imminent disasters, in order to evacuate the area in due time. But providing such warnings in areas where no Internet access is available poses a great challenge. In this paper, we proposed a method to transmit early warning messages via UMTS cellular networks, while relying on spare extensions of control channels (FACH). The results obtained are validate based on their comparison with theoretical considerations and are also benchmarked against the 3GPP standard. The results show that messages may be sent faster than with the use of the 3GPP standard.
Źródło:
Journal of Telecommunications and Information Technology; 2020, 4; 53-61
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies