The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] mobile(969hit)

141-160hit(969hit)

  • An Adaptation of Proxy Mobile IPv6 to OpenFlow Architecture over Software Defined Networking

    Seong-Mun KIM  Hyon-Young CHOI  Youn-Hee HAN  Sung-Gi MIN  

     
    PAPER-Network

      Vol:
    E98-B No:4
      Page(s):
    596-606

    In this paper, Proxy Mobile IPv6 (PMIPv6), which is a network-based mobility management protocol, is adapted to the OpenFlow architecture. Mobility-related signaling is generally performed by network entities on behalf of a mobile node, but in standard PMIPv6, the control and data packets are delivered and processed over the same network entities, which prevents the separation of the control and the data planes. In addition, IP tunneling inherent to PMIPv6 imposes excessive overhead for the network entities. In order to adapt PMIPv6 to the OpenFlow architecture, the mobility management function is separated from the PMIPv6 components, and components are reconstructed to take advantage of the offerings of the OpenFlow architecture. The components configure the flow table of the switches located in a path, which comprise the OpenFlow controller. Mobility-related signaling can then be performed at the dedicated secure channel, and all of the data packets can be sent normally in accordance with the flow table of the OpenFlow switches. Consequently, the proposed scheme eliminates IP tunneling when user traffic is forwarded and separates the data and the control planes. The performance analysis revealed that the proposed scheme can outperform PMIPv6 in terms of the signaling cost, packet delivery cost, and handover latency.

  • A Bullet-Proof Verification Approach to Defend against Black Hole Attacks in Mobile Ad Hoc Networks

    Firoz AHMED  Seokhoon YOON  Hoon OH  

     
    PAPER-Network

      Vol:
    E98-B No:3
      Page(s):
    422-436

    In mobile ad hoc networks, a malicious node can respond with a faked route reply (RREP) message to a source that explores a route in order to make the source establish a false route leading to the malicious node. Then, the malicious node can absorb all transmitted packets like a black hole. This paper proposes a totally secure defense against the black hole attack with low control overhead and high reliability. The proposed approach, named a bullet-proof verification (BPV) method, consists of a detection phase, in which a node detects a suspicious node by analyzing the data routing information of its neighbors and a verification phase, in which a node initiates the verification of a suspicious node conditionally only if it receives RREP from the suspicious node. The crux of this approach lies in using an encrypted verification message that goes straight to the destination through the path that may include some malicious nodes and also in using both destination sequence number and hop distance for verification. In addition, a distributed watchdog mechanism is employed to track down any malicious nodes. Simulation results show that the BPV approach reduces control overhead significantly and defends against black hole attack reliably.

  • Behavior Analysis of Video Application Users on Smart Phones Based on State Transition Diagram

    Norihiro FUKUMOTO  Shigehiro ANO  Shigeki GOTO  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    42-50

    Video traffic occupies a major part of current mobile traffic. The characteristics of video traffic are dominated by the behavior of the video application users. This paper uses a state transition diagram to analyze the behavior of video application users on smart phones. Video application users are divided into two categories; keyword search users and initial screen users. They take different first action in video viewing. The result of our analysis shows that the patience of video application users depends on whether they have a specific purpose when they launch a video application or not. Mobile network operators can improve the QoE of video application users by utilizing the results of this study.

  • Pedestrian Dead Reckoning for Mobile Phones Using Magnetic Deviation Map

    Noriaki KAKIUCHI  Kenichi SUNAGAWA  Shunsuke KAMIJO  

     
    PAPER

      Vol:
    E98-A No:1
      Page(s):
    313-322

    Pedestrian dead reckoning (PDR) is an effective positioning means that can be used in urban-canyon environments where the accuracy of GPS is significantly degraded. Magnetic disturbances caused by artificial objects affect the accuracy of positioning if the PDR system uses a magnetometer to estimate the heading direction. Conventional PDR systems consider magnetic disturbances as unpredictable error sources, but the error becomes predictable and removable if the amount of the deviation in the magnetic field can be calculated at any position. In this study, we propose a method to correct the heading direction by referring to a map of magnetic deviation. The experimental results show that our method reduced the error in the heading direction caused by magnetic disturbances. Our approach removed the error components that differ depending on the position, and consequently, the resultant trajectory represented better the shape of the true trajectory.

  • Location-Aware Store-Carry-Forward Routing Based on Node Density Estimation

    Tomotaka KIMURA  Takahiro MATSUDA  Tetsuya TAKINE  

     
    PAPER

      Vol:
    E98-B No:1
      Page(s):
    99-106

    We consider a location-aware store-carry-forward routing scheme based on node density estimation (LA Routing in short), which adopts different message forwarding strategies depending on node density at contact locations where two nodes encounter. To do so, each node estimates a node density distribution based on information about contact locations. In this paper, we clarify how the estimation accuracy affects the performance of LA Routing. We also examine the performance of LA Routing when it applies to networks with homogeneous node density. Through simulation experiments, we show that LA Routing is fairly robust against the accuracy of node density estimation and its performance is comparable with Probabilistic Routing even in the case that that node density is homogeneous.

  • Power Consumption Characteristics of Autonomous Decentralized Clustering Based on Local Interaction

    Ryo HAMAMOTO  Chisa TAKANO  Kenji ISHIDA  Masaki AIDA  

     
    PAPER-Wireless Network

      Vol:
    E97-D No:12
      Page(s):
    2984-2994

    Mobile ad hoc networks (MANETs) consist of mobile terminals that directly connect with one another to communicate without a network infrastructure, such as base stations and/or access points of wireless local area networks (LANs) connected to wired backbone networks. Large-scale disasters such as tsunamis and earthquakes can cause serious damage to life, property as well as any network infrastructure. However, MANETs can function even after severe disasters have destroyed regular network infrastructure. We have proposed an autonomous decentralized structure formation technology based on local interaction, and have applied it to implement autonomous decentralized clustering on MANETs. This method is known to configure clusters that reflect the network condition, such as residual battery power and the degree of each node. However, the effect of clusters that reflect the network condition has not been evaluated. In this study, we configure clusters using our method, the back-diffusion method, and a bio-inspired method, which is a kind of autonomous decentralized clustering that cannot reflect the network condition. We also clarify the importance of clustering that reflects the network condition, with regard to power consumption and data transfer efficiency.

  • Opportunistic Resource Sharing in Mobile Cloud Computing

    Wei LIU  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  

     
    PAPER

      Vol:
    E97-B No:12
      Page(s):
    2668-2679

    The mobile cloud computing (MCC) paradigm is aimed at integrating mobile devices with cloud computing. In the client-server architecture of MCC, mobile devices offload tasks to the cloud to utilize the computation and storage resources of data centers. However, due to the rapid increase in the traffic demand and complexity of mobile applications, service providers have to continuously upgrade their infrastructures at great expense. At the same time, modern mobile devices have greater resources (communication, computation, and sensing), and these resources are not always fully utilized by device users. Therefore, mobile devices, from time to time, encounter other devices that could provide resources to them. Because the amount of such resources has increased with the number of mobile devices, researchers have begun to consider making use of these resources, located at the “edge” of mobile networks, to increase the scalability of future information networks. This has led to a cooperation based architecture of MCC. This paper reports the concept and design of an resource sharing mechanism that utilize resources in mobile devices through opportunistic contacts between them. Theoretical models and formal definitions of problems are presented. The efficiency of the proposed mechanism is validated through formal proofs and extensive simulation.

  • Signal Detection for EM-Based Iterative Receivers in MIMO-OFDM Mobile Communications

    Kazushi MURAOKA  Kazuhiko FUKAWA  Hiroshi SUZUKI  Satoshi SUYAMA  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E97-B No:11
      Page(s):
    2480-2490

    Joint signal detection and channel estimation based on the expectation-maximization (EM) algorithm has been investigated for multiple-input multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) mobile communications over fast-fading channels. The previous work in [20] developed a channel estimation method suitable for the EM-based iterative receiver. However, it remained possible for unreliable received signals to be repetitively used during the iterative process. In order to improve the EM-based iterative receiver further, this paper proposes spatial removal from the perspective of a message-passing algorithm on factor graphs. The spatial removal performs the channel estimation of a targeted antenna by using detected signals that are obtained from the received signals of all antennas other than the targeted antenna. It can avoid the repetitive use of unreliable received signals for consecutive signal detection and channel estimation. Appropriate applications of the spatial removal are also discussed to exploit both the removal effect and the spatial diversity. Computer simulations under fast-fading conditions demonstrate that the appropriate applications of the spatial removal can improve the packet error rate (PER) of the EM-based receiver thanks to both the removal effect and the spatial diversity.

  • Distributed Mobility Management Scheme with Multiple LMAs in Proxy Mobile IPv6

    Won-Kyeong SEO  Jae-In CHOI  You-Ze CHO  

     
    PAPER-Network

      Vol:
    E97-B No:11
      Page(s):
    2327-2336

    The Internet Engineering Task Force (IETF) has been actively standardizing distributed mobility management (DMM) schemes with multiple Mobility Anchors (MAs). Yet, all existing schemes have limitations that preclude the efficient distribution of mobile data traffic, including single point failure problems, heavy tunneling overheads between MAs, and a restrictive traffic distribution for external nodes in a mobility domain. Therefore, this paper proposes an efficient mobility management scheme with a virtual Local Mobility Anchor (vLMA). While the vLMA is designed assuming multiple replicated LMAs for a PMIPv6 domain, it acts virtually as a single LMA for the internal and external nodes in the PMIPv6 domain. Furthermore, the vLMA distributes mobile data traffic using replicated LMAs, and routes packets via a replicated LMA on the optimal routing path. Performance evaluations confirm that the proposed scheme can distribute mobile data traffic more efficiently and reduce the end-to-end packet delay than the Distributed Local Mobility Anchor (DLMA) and the Proxy Mobile IPv6 (PMIPv6).

  • Inferring Geographical Partitions by Exploiting User Mobility in Urban Area

    Feng XIANG  Benxiong HUANG  Lai TU  Duan HU  

     
    PAPER

      Vol:
    E97-D No:10
      Page(s):
    2623-2631

    Understanding the structure and evolution of spatial-temporal networks is crucial for different fields ranging from urbanism to epidemiology. As location based technologies are pervasively used in our daily life, large amount of sensing data has brought the opportunities to study human activities and city dynamics. Ubiquitous cell phones can be such a sensor to analyze the social connection and boundaries of geographical regions. In this paper, we exploit user mobility based on large-scale mobile phone records to study urban areas. We collect the call data records from 1 million anonymous subscribers of 8 weeks and study the user mobility flux between different regions. First we construct the urban areas as a spatial network and use modularity detection algorithm to study the intrinsic connection between map areas. Second, another generative model which is widely used in linguistic context is adopted to explore the functions of regions. Based on mobile call records we are able to derive the partitions which match boundaries of the administrative districts. Our results can also catch the dynamics of urban area as the basis for city planning and policy making.

  • Path Loss Model for Low Antenna Heights in Residential Areas at Middle VHF Band

    Motoharu SASAKI  Wataru YAMADA  Naoki KITA  Takatoshi SUGIYAMA  

     
    PAPER

      Vol:
    E97-B No:10
      Page(s):
    2093-2101

    A path loss model for low antenna heights below surrounding buildings in residential areas is presented to contribute to the construction of VHF band wireless systems. The model is constructed on the basis of measurement results at 167.65MHz, near center frequency at VHF band. Path loss characteristics in the middle VHF band are compared to those in bands above UHF. The dominant paths in bands above UHF include propagation paths below surrounding buildings, such as paths along roads. However, in the middle VHF band, these paths are instantly attenuated because their 1st Fresnel zone radius is larger than the average building height or road width. The dominant path in the middle VHF band is the over-roof propagation path, and the 1st Fresnel zone of the path is shielded by the buildings and the ground surface. The proposed path loss model has two features. First, it derives the effective height of the ground surface from the terrain profile of the buildings and the ground surface. Second, it uses formulas of a two-path model to take the shielding of the 1st Fresnel zone into account. Finally, it is shown that the proposed model is able to predict the path loss measurement results more accurately than the conventional model.

  • Quality-of-Experience (QoE) in Emerging Mobile Social Networks

    Mianxiong DONG  Takashi KIMATA  Komei SUGIURA  Koji ZETTSU  

     
    PAPER

      Vol:
    E97-D No:10
      Page(s):
    2606-2612

    Mobile social networks (MSN) provides diverse services to meet the needs of mobile users, i.e., discovering new friends, and sharing their pictures, videos and other information among their common interest friends. On the other hand, Quality-of-Experience (QoE) is a new concept related to but differs from Quality-of-Service (QoS) perception. QoE is a subjective measure of a customer's experiences with a service focuses on the entire service experience, and is a more holistic evaluation. So far, QoS issues have been focused and mainly addressed in the literature of MSNs. To the best of our knowledge, this paper is the first article to address QoE issues in emerging MSNs. In this paper, we first present a comprehensive investigation on recent advances in MSNs as well as QoE issues addressed in various types of applications and networks. From the lessons learned from the literature, then we propose a future research direction of QoE in MSNs.

  • Experimental Investigation on RF Characteristics of Cryogenically-Cooled 3W-Class Receiver Amplifier Employing GaN HEMT with Blue Light LED for Mobile Base Stations

    Yasunori SUZUKI  Shoichi NARAHASHI  Toshio NOJIMA  

     
    PAPER

      Vol:
    E97-C No:10
      Page(s):
    930-937

    This paper presents an experimental investigation on the RF characteristics of a 3W-class cryogenically-cooled receiver amplifier employing a gallium-nitride high electron mobility transistor (GaN HEMT) with a blue light for mobile base stations. In general, a cryogenically-cooled receiver amplifier using a GaN HEMT exhibits unstable DC characteristics similar to those found in the current collapse phenomenon because the GaN HEMT loses thermal energy at cryogenic temperatures. The fabricated cryogenically-cooled receiver amplifier achieves stable DC characteristics by injecting blue light into the GaN HEMT instead of thermal energy. Experimental results show that the amplifier achieves fine stable DC characteristics for deviation in the drain-source current from 42% to 5% and RF characteristics for a maximum power added efficiency from 58% to 68% without and with the blue light at 60,K. The fabricated amplifier is effective in reducing the power consumption at cryogenic temperatures. To the best of our knowledge, this paper is the first report regarding RF characteristics of a cryogenically-cooled receiver amplifier using a blue light for mobile base stations.

  • Block Utilization-Aware Buffer Replacement Scheme for Mobile NAND Flash Storage

    Dong Hyun KANG  Changwoo MIN  Young Ik EOM  

     
    LETTER-Data Engineering, Web Information Systems

      Vol:
    E97-D No:9
      Page(s):
    2510-2513

    NAND flash storage devices, such as eMMCs and microSD cards, are now widely used in mobile devices. In this paper, we propose a novel buffer replacement scheme for mobile NAND flash storages. It efficiently improves write performance by evicting pages flash-friendly and maintains high cache hit ratios by managing pages in order of recency. Our experimental results show that the proposed scheme outperforms the best performing scheme in the recent literature, Sp.Clock, by 48%.

  • Coverage Maintenance and Energy Control in Mobile Wireless Sensor Networks

    Tongyu GE  Junhai LUO  Shu ZHANG  

     
    PAPER-Network

      Vol:
    E97-B No:9
      Page(s):
    1889-1897

    In mobile wireless sensor networks, coverage and energy are two significant factors determining network performance. When taking both factors into account, the challenges include how to select and migrate nodes to keep coverage quality, how to forecast and prevent potential coverage holes and how to use energy control in mobile networks. In this paper, we propose a new Coverage Maintenance and Energy Control (CMEC) algorithm to achieve and keep high coverage quality and energy efficiency. For CMEC, we provide a new cost metric for selecting migration nodes. Our simulation results confirm that our algorithm improves coverage performance and lifetime of network.

  • A Local Resource Sharing Platform in Mobile Cloud Computing

    Wei LIU  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  

     
    PAPER-Network

      Vol:
    E97-B No:9
      Page(s):
    1865-1874

    Despite the increasing use of mobile computing, exploiting its full potential is difficult due to its inherent characteristics such as error-prone transmission channels, diverse node capabilities, frequent disconnections and mobility. Mobile Cloud Computing (MCC) is a paradigm that is aimed at overcoming previous problems through integrating mobile devices with cloud computing. Mobile devices, in the traditional client-server architecture of MCC, offload their tasks to the cloud to utilize the computation and storage resources of data centers. However, along with the development of hardware and software technologies in mobile devices, researchers have begun to take into consideration local resource sharing among mobile devices themselves. This is defined as the cooperation based architecture of MCC. Analogous to the conventional terminology, the resource platforms that are comprised of surrounding surrogate mobile devices are called local resource clouds. Some researchers have recently verified the feasibility and benefits of this strategy. However, existing work has neglected an important issue with this approach, i.e., how to construct local resource clouds in dynamic mobile wireless networks. This paper presents the concept and design of a local resource cloud that is both energy and time efficient. Along with theoretical models and formal definitions of problems, an efficient heuristic algorithm with low computational complexity is also presented. The results from simulations demonstrate the effectiveness of the proposed models and method.

  • A Survey on Thai Input Methods on Smartphones Open Access

    Cholwich NATTEE  

     
    SURVEY PAPER-Artificial Intelligence, Data Mining

      Vol:
    E97-D No:9
      Page(s):
    2338-2345

    Smartphones have become vital devices in the current on-the-go Thai culture. Typically, virtual keyboards serve as tools for text input on smartphones. Due to the limited screen area and the large number of Thai characters, the size of each button on the keyboard is quite small. This leads to character mistyping and low typing speed. In this paper, we present a typical framework of a Thai Input Method on smartphones which includes four processes; Character Candidate Generation, Word Candidate Generation, Word Candidate Display, and Model Update. This framework not only works with Thai, it works with other letter-based languages as well. We also review virtual keyboards and techniques currently used and available for Thai text input.

  • Light Source Estimation in Mobile Augmented Reality Scenes by Using Human Face Geometry

    Emre KOC  Selim BALCISOY  

     
    PAPER-Augmented Reality

      Vol:
    E97-D No:8
      Page(s):
    1974-1982

    Light source estimation and virtual lighting must be believable in terms of appearance and correctness in augmented reality scenes. As a result of illumination complexity in an outdoor scene, realistic lighting for augmented reality is still a challenging problem. In this paper, we propose a framework based on an estimation of environmental lighting from well-defined objects, specifically human faces. The method is tuned for outdoor use, and the algorithm is further enhanced to illuminate virtual objects exposed to direct sunlight. Our model can be integrated into existing mobile augmented reality frameworks to enhance visual perception.

  • Practice and Evaluation of Pagelet-Based Client-Side Rendering Mechanism

    Hao HAN  Yinxing XUE  Keizo OYAMA  Yang LIU  

     
    PAPER-Software Engineering

      Vol:
    E97-D No:8
      Page(s):
    2067-2083

    The rendering mechanism plays an indispensable role in browser-based Web application. It generates active webpages dynamically and provides human-readable layout through template engines, which are used as a standard programming model to separate the business logic and data computations from the webpage presentation. The client-side rendering mechanism, owing to the advances of rich application technologies, has been widely adopted. The adoption of client side rendering brings not only various merits but also new problems. In this paper, we propose and construct “pagelet”, a segment-based template engine for developing flexible and extensible Web applications. By presenting principles, practice and usage experience of pagelet, we conduct a comprehensive analysis of possible advantages and disadvantages brought by client-side rendering mechanism from the viewpoints of both developers and end-users.

  • Katakana EdgeWrite: An EdgeWrite Version for Japanese Text Entry

    Kentaro GO  Yuichiro KINOSHITA  

     
    LETTER-Interaction

      Vol:
    E97-D No:8
      Page(s):
    2053-2054

    This paper presents our project of designing EdgeWrite text entry methods for Japanese language. We are developing a version of EdgeWrite text entry method for Japanese language: Katakana EdgeWrite. Katakana EdgeWrite specifies the line stroke directions and writing order of the Japanese Katakana character. The ideal corner sequence pattern of EdgeWrite for each Katakana character is designed based on its line stroke directions and writing order.

141-160hit(969hit)