The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] mobile(969hit)

101-120hit(969hit)

  • Fronthaul Constrained Coordinated Transmission in Cloud-Based 5G Radio Access Network: Energy Efficiency Perspective

    Ying SUN  Yang WANG  Yuqing ZHONG  

     
    PAPER-Network

      Pubricized:
    2017/02/08
      Vol:
    E100-B No:8
      Page(s):
    1343-1351

    The cloud radio access network (C-RAN) is embracing unprecedented popularity in the evolution of current RAN towards 5G. One of the essential benefits of C-RAN is facilitating cooperative transmission to enhance capacity and energy performances. In this paper, we argue that the conventional symmetric coordination in which all antennas participate in transmission does not necessarily lead to an energy efficient C-RAN. Further, the current assessments of energy consumption should be modified to match this shifted paradigm in network architecture. Towards this end, this paper proposes an asymmetric coordination scheme to optimize the energy efficiency of C-RAN. Specifically, asymmetric coordination is approximated and formulated as a joint antenna selection and power allocation problem, which is then solved by a proposed sequential-iterative algorithm. A modular power consumption model is also developed to convert the computational complexity of coordination into baseband power consumption. Simulations verify the performance benefits of our proposed asymmetric coordination in effectively enhancing system energy efficiency.

  • APPraiser: A Large Scale Analysis of Android Clone Apps

    Yuta ISHII  Takuya WATANABE  Mitsuaki AKIYAMA  Tatsuya MORI  

     
    PAPER-Program Analysis

      Pubricized:
    2017/05/18
      Vol:
    E100-D No:8
      Page(s):
    1703-1713

    Android is one of the most popular mobile device platforms. However, since Android apps can be disassembled easily, attackers inject additional advertisements or malicious codes to the original apps and redistribute them. There are a non-negligible number of such repackaged apps. We generally call those malicious repackaged apps “clones.” However, there are apps that are not clones but are similar to each other. We call such apps “relatives.” In this work, we developed a framework called APPraiser that extracts similar apps and classifies them into clones and relatives from the large dataset. We used the APPraiser framework to study over 1.3 million apps collected from both official and third-party marketplaces. Our extensive analysis revealed the following findings: In the official marketplace, 79% of similar apps were attributed to relatives, while in the third-party marketplace, 50% of similar apps were attributed to clones. The majority of relatives are apps developed by prolific developers in both marketplaces. We also found that in the third-party market, of the clones that were originally published in the official market, 76% of them are malware.

  • IEEE 802.15.4g Based Wi-SUN Communication Systems Open Access

    Hiroshi HARADA  Keiichi MIZUTANI  Jun FUJIWARA  Kentaro MOCHIZUKI  Kentaro OBATA  Ryota OKUMURA  

     
    INVITED PAPER-Transmission Systems and Transmission Equipment for Communications

      Pubricized:
    2017/01/12
      Vol:
    E100-B No:7
      Page(s):
    1032-1043

    This paper summarizes Wi-SUN communication systems and their physical (PHY) layer and media access control (MAC) specifications. Firstly, the Wi-SUN communication systems are categorized into three. The key PHY and MAC standards, IEEE 802.15.4g and .4e, that configure the systems are explained, and fundamental transmission performances of the systems in the PHY layer and MAC layer are evaluated by computer simulations. Then, the Wi-SUN alliance and the Wi-SUN profiles that include IEEE 802.15.4g and .4e are explained. Finally, to understand the transmission performance of actual IEEE 802.15.4g Wi-SUN radio devices, PER performances under AWGN and multipath fading environments are measured by using IEEE 802.15.4g compliant and Wi-SUN alliance certified radio modules. This paper is an instruction paper for the beginners of the Wi-SUN based communications systems.

  • Virtualizing Graphics Architecture of Android Mobile Platforms in KVM/ARM Environment

    Sejin PARK  Byungsu PARK  Unsung LEE  Chanik PARK  

     
    PAPER-Software System

      Pubricized:
    2017/04/18
      Vol:
    E100-D No:7
      Page(s):
    1403-1415

    With the availability of virtualization extension in mobile processors, e.g. ARM Cortex A-15, multiple virtual execution domains are efficiently supported in a mobile platform. Each execution domain requires high-performance graphics services for full-featured user interfaces such as smooth scrolling, background image blurring, and 3D images. However, graphics service is hard to be virtualized because multiple service components (e.g. ION and Fence) are involved. Moreover, the complexity of Graphical Processing Unit (GPU) device driver also makes harder virtualizing graphics service. In this paper, we propose a technique to virtualize the graphics architecture of Android mobile platform in KVM/ARM environment. The Android graphics architecture relies on underlying Linux kernel services such as the frame buffer memory allocator ION, the buffer synchronization service Fence, GPU device driver, and the display synchronization service VSync. These kernel services are provided as device files in Linux kernel. Our approach is to para-virtualize these device files based on a split device driver model. A major challenge is to translate guest-view of information into host-view of information, e.g. memory address translation, file descriptor management, and GPU Memory Management Unit (MMU) manipulation. The experimental results show that the proposed graphics virtualization technique achieved almost 84%-100% performance of native applications.

  • A Survey of Efficient Ray-Tracing Techniques for Mobile Radio Propagation Analysis Open Access

    Tetsuro IMAI  

     
    INVITED SURVEY PAPER-Antennas and Propagation

      Pubricized:
    2016/12/01
      Vol:
    E100-B No:5
      Page(s):
    666-679

    With the advances in computer processing that have yielded an enormous increase in performance, numerical analytical approaches based on electromagnetic theory have recently been applied to mobile radio propagation analysis. One such approach is the ray-tracing method based on geometrical optics and the uniform geometrical theory of diffraction. In this paper, ray-tracing techniques that have been proposed in order to improve computational accuracy and speed are surveyed. First, imaging and ray-launching methods are described and their extended methods are surveyed as novel fundamental ray-tracing techniques. Next, various ray-tracing acceleration techniques are surveyed and categorized into three approaches, i.e., deterministic, heuristic, and brute force. Then, hybrid methods are surveyed such as those employing Physical optics, the Effective Roughness model, and the Finite-Difference Time-Domain method that have been proposed in order to improve analysis accuracy.

  • Simulation Study of Low Latency Network Architecture Using Mobile Edge Computing

    Krittin INTHARAWIJITR  Katsuyoshi IIDA  Hiroyuki KOGA  

     
    PAPER

      Pubricized:
    2017/02/08
      Vol:
    E100-D No:5
      Page(s):
    963-972

    Attaining extremely low latency service in 5G cellular networks is an important challenge in the communication research field. A higher QoS in the next-generation network could enable several unprecedented services, such as Tactile Internet, Augmented Reality, and Virtual Reality. However, these services will all need support from powerful computational resources provided through cloud computing. Unfortunately, the geolocation of cloud data centers could be insufficient to satisfy the latency aimed for in 5G networks. The physical distance between servers and users will sometimes be too great to enable quick reaction within the service time boundary. The problem of long latency resulting from long communication distances can be solved by Mobile Edge Computing (MEC), though, which places many servers along the edges of networks. MEC can provide shorter communication latency, but total latency consists of both the transmission and the processing times. Always selecting the closest edge server will lead to a longer computing latency in many cases, especially when there is a mass of users around particular edge servers. Therefore, the research studies the effects of both latencies. The communication latency is represented by hop count, and the computation latency is modeled by processor sharing (PS). An optimization model and selection policies are also proposed. Quantitative evaluations using simulations show that selecting a server according to the lowest total latency leads to the best performance, and permitting an over-latency barrier would further improve results.

  • Mobile Sensor Relocation for Nonuniform and Dynamic Coverage Requirements

    Thamarak KHAMPEERPAT  Chaiporn JAIKAEO  

     
    PAPER-Information Network

      Pubricized:
    2016/12/05
      Vol:
    E100-D No:3
      Page(s):
    520-530

    Wireless sensor networks are being used in many disaster-related applications. Certain types of disasters are studied and modeled with different and dynamic risk estimations in different areas, hence requiring different levels of monitoring. Such nonuniform and dynamic coverage requirements pose a challenge to a sensor coverage problem. This work proposes the Mobile sensor Relocation using Delaunay triangulation And Shifting on Hill climbing (MR-DASH) approach, which calculates an appropriate location for each mobile sensor as an attempt to maximize coverage ratio. Based on a probabilistic sensing model, it constructs a Delaunay triangulation from static sensors' locations and vertices of interesting regions. The resulting triangles are then prioritized based on their sizes and corresponding levels of requirement so that mobile sensors can be relocated accordingly. The proposed method was both compared with an existing previous work and demonstrated with real-world disaster scenarios by simulation. The result showed that MR-DASH gives appropriate target locations that significantly improve the coverage ratio with relatively low total sensors' moving distance, while properly adapting to variations in coverage requirements.

  • Energy-Aware Download Method in LTE Based Smartphone

    Jie REN  Ling GAO  Hai WANG  QuanLi GAO  ZheWen ZHANG  

     
    PAPER-Information Network

      Pubricized:
    2016/11/18
      Vol:
    E100-D No:2
      Page(s):
    304-312

    Mobile traffic is experiencing tremendous growth, and this growing wave is no doubt increasing the use of radio component of mobile devices, resulting in shorter battery lifetime. In this paper, we present an Energy-Aware Download Method (EDM) based on the Markov Decision Process (MDP) to optimize the data download energy for mobile applications. Unlike the previous download schemes in literature that focus on the energy efficiency by simply delaying the download requests, which often leads to a poor user experience, our MDP model learns off-line from a set of training download workloads for different user patterns. The model is then integrated into the mobile application to deal the download request at runtime, taking into account the current battery level, LTE reference signal receiving power (RSRP), reference signal signal to noise radio (RSSNR) and task size as input of the decision process, and maximizes the reward which refers to the expected battery life and user experience. We evaluate how the EDM can be used in the context of a real file downloading application over the LTE network. We obtain, on average, 20.3%, 15% and 45% improvement respectively for energy consumption, latency, and performance of energy-delay trade off, when compared to the Android default download policy (Minimum Delay).

  • Host-Based and Network-Based Distributed Mobility Management for NEMO

    Parin SORNLERTLAMVANICH  Sinchai KAMOLPHIWONG  

     
    PAPER-Network

      Vol:
    E100-B No:1
      Page(s):
    67-74

    The Mobile IPv6 protocol (MIPv6) allows a single Mobile Node (MN) to keep the same IPv6 address independently of its network of attachment. Network Mobility protocol (NEMO) is an extension of MIPv6. NEMO is concerned with managing the mobility of an entire network, so it's used for devices or vehicles which move to another point of attachment to the Internet. Proxy Mobile IPv6 (PMIPv6) has been developed for local mobility management whereas MIPv6 and NEMO address global mobility for both hosts and routers. This paper proposes a distributed mobility solution based on NEMO for heterogeneous mobile IP networks, so called Host-based and Network-based Distributed Mobility Management for NEMO (HND-NEMO), where different types of IP mobility management are operating. Our solution utilizes both network-based and host-based mechanisms. Multiple Home Agents (HAs) are deployed, and the mobility anchors are closer to the edge of the network in order to provide optimal routing and lower delays. We show that our solution provides smooth mobility in global domains, local domains, and no mobility service domains, in terms of handover latency, signaling and packet delivery costs, and end to end delay.

  • A Practical Biometric Random Number Generator for Mobile Security Applications

    Alper KANAK  Salih ERGÜN  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    158-166

    IDMs are getting more effective and secure with biometric recognition and more privacy-preserving with advanced cryptosystems. In order to meet privacy and security needs of an IDM, the cryptographic background should rely on reliable random number generation. In this study, a Biometric Random Number Generator (BRNG) is proposed which plays a crucial role in a typical cryptosystem. The proposed novel approach extracts the high-frequency information in biometric signal which is associated with uncertainty existing in nature of biometrics. This bio-uncertainty, utilized as an entropy source, may be caused by sensory noise, environmental changes, position of the biometric trait, accessories worn, etc. The filtered nondeterministic information is then utilized by a postprocessing technique to obtain a random number set fulfilling the NIST 800-22 statistical randomness criteria. The proposed technique presents random number sequences without need of an additional hardware.

  • Home Base-Aware Store-Carry-Forward Routing Using Location-Dependent Utilities of Nodes

    Tomotaka KIMURA  Yutsuki KAYAMA  Tetsuya TAKINE  

     
    PAPER-Network

      Vol:
    E100-B No:1
      Page(s):
    17-27

    We propose a home base-aware store-carry-forward routing scheme using location-dependent utilities of nodes, which adopts different message forwarding strategies depending on location where nodes encounter. Our routing scheme first attempts to deliver messages to its home base, the area with the highest potential for the presence of the destination node in the near future. Once a message copy reaches its home base, message dissemination is limited within the home base, and nodes with message copies wait for encountering the destination node. To realize our routing scheme, we use two different utilities of nodes depending on location: Outside the home base of a message, nodes approaching to the home base have high utility values, while within the home base, nodes staying the home base have high utility values. By using these utilities properly, nodes with message copies will catch the destination node “by ambush” in the home base of the destination node. Through simulation experiments, we demonstrate the effectiveness of our routing scheme.

  • A Mobile Agent Based Distributed Variational Bayesian Algorithm for Flow and Speed Estimation in a Traffic System

    Mohiyeddin MOZAFFARI  Behrouz SAFARINEJADIAN  

     
    PAPER-Sensor network

      Pubricized:
    2016/08/24
      Vol:
    E99-D No:12
      Page(s):
    2934-2942

    This paper provides a mobile agent based distributed variational Bayesian (MABDVB) algorithm for density estimation in sensor networks. It has been assumed that sensor measurements can be statistically modeled by a common Gaussian mixture model. In the proposed algorithm, mobile agents move through the routes of the network and compute the local sufficient statistics using local measurements. Afterwards, the global sufficient statistics will be updated using these local sufficient statistics. This procedure will be repeated until convergence is reached. Consequently, using this global sufficient statistics the parameters of the density function will be approximated. Convergence of the proposed method will be also analytically studied, and it will be shown that the estimated parameters will eventually converge to their true values. Finally, the proposed algorithm will be applied to one-dimensional and two dimensional data sets to show its promising performance.

  • Improved Method of Detecting Data in Data-Embedded Printed Image Considering Mobile Devices

    Aya HIYAMA  Mitsuji MUNEYASU  

     
    LETTER-Image

      Vol:
    E99-A No:11
      Page(s):
    2000-2002

    In this paper, we propose an improved method of embedding and detecting data in a printed image using a camera of a mobile device. The proposed method is based on the data diffusion method. We discuss several problems in the conventional lens distortion correction method. In addition, the possibility of using multiple captured images by employing a motion-image-capturing technique is also examined. A method of selecting captured images that are expected to obtain a high detection rate is also proposed. From the experimental results, it is shown that the proposed method is effective for improving data detection.

  • A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks

    Dongxu CHENG  Jianwei LIU  Zhenyu GUAN  Tao SHANG  

     
    PAPER-Information Network

      Pubricized:
    2016/07/21
      Vol:
    E99-D No:11
      Page(s):
    2716-2722

    Established in self-organized mode between mobile terminals (MT), mobile Ad Hoc networks are characterized by a fast change of network topology, limited power dissipation of network node, limited network bandwidth and poor security of the network. Therefore, this paper proposes an efficient one round certificateless authenticated group key agreement (OR-CLAGKA) protocol to satisfy the security demand of mobile Ad Hoc networks. Based on elliptic curve public key cryptography (ECC), OR-CLAGKA protocol utilizes the assumption of elliptic curve discrete logarithm problems (ECDLP) to guarantee its security. In contrast with those certificateless authenticated group key agreement (GKA) protocols, OR-CLAGKA protocol can reduce protocol data interaction between group users and it is based on efficient ECC public key infrastructure without calculating bilinear pairings, which involves negligible computational overhead. Thus, it is particularly suitable to deploy OR-CLAGKA protocol on MT devices because of its limited computation capacity and power consumption. Also, under the premise of keeping the forward and backward security, OR-CLAGKA protocol has achieved appropriate optimization to improve the performance of Ad Hoc networks in terms of frequent communication interrupt and reconnection. In addition, it has reduced executive overheads of key agreement protocol to make the protocol more suitable for mobile Ad Hoc network applications.

  • Two-Tier Mobile Data Aggregation in Wireless Sensor Networks

    Daehee KIM  Sangbin LEE  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E99-A No:10
      Page(s):
    1900-1903

    Recently, many wireless sensor networks (WSNs) have employed mobile sensor nodes to collect a variety of data from mobile elements such as humans, animals and cars. In this letter, we propose an efficient mobile data aggregation scheme to improve the overall performance in gathering the data of the mobile nodes. We first propose a spatial mobile data aggregation scheme to aggregate the data of the mobile node spatially, which is then extended to a two-tier mobile data aggregation by supplementing a temporal mobile data aggregation scheme to aggregate the data of multiple mobile nodes temporally. Simulation results show that our scheme significantly reduces the energy consumption and gathering delay for data collection from mobile nodes in WSNs.

  • Application of Non-Orthogonal Multiple Access Scheme for Satellite Downlink in Satellite/Terrestrial Integrated Mobile Communication System with Dual Satellites

    Eiji OKAMOTO  Hiroyuki TSUJI  

     
    PAPER

      Vol:
    E99-B No:10
      Page(s):
    2146-2155

    In satellite/terrestrial integrated mobile communication systems (STICSs), a user terminal directly connects both terrestrial and satellite base stations. STICS enables expansion of service areas and provides a robust communication service for large disasters. However, the cell radius of the satellite system is large (approximately 100km), and thus a capacity enhancement of the satellite subsystem for accommodating many users is needed. Therefore, in this paper, we propose an application of two methods — multiple-input multiple-output (MIMO) transmission using multi-satellites and non-orthogonal multiple access (NOMA) for STICS — to realize the performance improvement in terms of system capacity and user fairness. Through numerical simulations, we show that system capacity and user fairness are increased by the proposed scheme that applies the two methods.

  • Mobile Agent-Based Information Dissemination Scheme Using Location Information in Vehicular Ad Hoc Networks

    Takeshi HASHIMOTO  Junich AOKI  Tomoyuki OHTA  Yoshiaki KAKUDA  

     
    PAPER

      Vol:
    E99-B No:9
      Page(s):
    1958-1966

    A vehicular ad hoc network (VANET) consists of vehicles (mobile nodes) and road side units which are equipped with the wireless devices such as wireless LANs. Mobile nodes exchange information messages with each other so that VANETs are configured in a self-organized manner. As one of network service scenarios in VANETs, there is a network service to provide the parking spaces in the city central to vehicles (mobile nodes). In this scenario, the road side units (source nodes) which are deployed at the parking spaces periodically disseminate the number of available parking spaces to mobile nodes. Therefore, in this paper, we propose a mobile agent-based information dissemination scheme using location information of mobile nodes and source nodes in the VANET environment. In addition, we conduct simulation experiments in the VANET environment to evaluate the proposed mobile agent-based information dissemination scheme. We confirmed that it could disseminate information messages with lower overhead because mobile agents migrate among mobile nodes by using the location information.

  • Mobile WiMAX Handover for Real-Time Application

    Pongtep POOLNISAI  Thawatchai MAYTEEVARUNYOO  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:8
      Page(s):
    1910-1918

    This paper presents an improved Mobile WiMAX handover (HO) algorithm for real-time application by using a Link_Going_Down (LGD) trigger technique. Mobile WiMAX is a wireless networking system based on the IEEE 802.16e standard. In order to support phone mobility, a HO scheme of some kind must be adopted, and in this standard hard handover (HHO) is defined as mandatory. Since, the fact that there will be a pause in data transmission during the HO process, delay in communication will occur. Thus, the HO time (>50ms) can degrade system performance when implemented in real-time applications such as Video Streaming or Internet Protocol Television (IPTV). Additionally, the HHO takes approximately 300ms because the HO process doesn't start at the best point. The HHO standard considers only the received signal strength (RSS) to decide initiation. The mobile station velocity is also an important factor in HO initiation that should not be neglected. To deal with the problems of handover delay, this paper proposes a new HO scheme. This scheme adopts the dynamic HO threshold that used LGD technique to define the starting HO process. This technique is based on the RSSD (measured by the Doppler Effect technique), mobile velocities and handover time. Consequently, the HO process starts at the right time and HO time is reduced (<50 ms) and the network resource utilization is enhanced to be more efficient.

  • A Prediction-Based Approach to Moving-Phenomenon Monitoring Using Mobile Sensor Nodes

    Duc Van LE  Hoon OH  Seokhoon YOON  

     
    PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1754-1762

    Deploying a group of mobile sensor (MS) nodes to monitor a moving phenomenon in an unknown and open area includes a lot of challenges if the phenomenon moves quickly and due to the limited capabilities of MS nodes in terms of mobility, sensing and communication ranges. To address these challenges and achieve a high weighted sensing coverage, in this paper, we propose a new algorithm for moving-phenomenon monitoring, namely VirFID-MP (Virtual Force (VF)-based Interest-Driven phenomenon monitoring with Mobility Prediction). In VirFID-MP, the future movement of the phenomenon is first predicted using the MS nodes' movement history data. Then, the prediction information is used to calculate a virtual force, which is utilized to speed up MS nodes toward the moving phenomenon. In addition, a prediction-based oscillation-avoidance algorithm is incorporated with VirFID-MP movement control to reduce the nodes' energy consumption. Our simulation results show that VirFID-MP outperforms original VirFID schemes in terms of weighted coverage efficiency and energy consumption.

  • Radio Access Technologies for Fifth Generation Mobile Communications System: Review of Recent Research and Developments in Japan Open Access

    Hidekazu MURATA  Eiji OKAMOTO  Manabu MIKAMI  Akihiro OKAZAKI  Satoshi SUYAMA  Takamichi INOUE  Jun MASHINO  Tetsuya YAMAMOTO  Makoto TAROMARU  

     
    INVITED PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E99-B No:8
      Page(s):
    1638-1647

    As the demand for higher transmission rates and spectral efficiency is steadily increasing, the research and development of novel mobile communication systems has gained momentum. This paper focuses on providing a comprehensive survey of research and development activities on fifth generation mobile communication systems in Japan. We try to survey a vast area of wireless communication systems and the developments that led to future 5G systems.

101-120hit(969hit)