scinapse is loading now...
Mobile Networks and Applications
IF
2.50
Papers
1689
Papers 1681
1 page of 169 pages (1,681 results)
Newest
Published on Oct 24, 2018in Mobile Networks and Applications 2.50
Pradip Kumar Sharma9
Estimated H-index: 9
(Seoul National University of Science and Technology),
Jin Ho Park2
Estimated H-index: 2
(Soongsil University)
+ 1 AuthorsJong Hyuk Park26
Estimated H-index: 26
(Seoul National University of Science and Technology)
To address the challenges of flexible device utilization, heterogeneous device interoperability, and security enhancement in smart homes, this paper proposes a new architecture for the software defined network to realize secure smart home environment (SHSec). SHSec concentrates on the capabilities required to deliver a flexible generic platform and the modularity of open-source service creation components for a user-friendly smart home by adopting the traditional software-defined network concept...
1 Citations Source Cite
Published on Jun 28, 2018in Mobile Networks and Applications 2.50
Bingxian Lu (Dalian University of Technology), Lei Wang (Dalian University of Technology)+ 5 AuthorsGuangjie Han1
Estimated H-index: 1
(Chinese Academy of Sciences)
IoT (Internet of Things) security has become a severe yet not well solved problem attracting increasing research attention as well as industrial concerns. Location-based access control approaches, such as Wi-Fi geo-fencing, promise to fulfill the needs of preventing unauthorized access to IoT systems. We propose a crowdsourcing method for location aware security access control, namely LaSa, which is able to confine wireless network access inside certain physical areas only using a single commerc...
Source Cite
Published on Jul 19, 2018in Mobile Networks and Applications 2.50
Chung-Yun Hsiao2
Estimated H-index: 2
(National Chiao Tung University),
Chih-Chieh Huang1
Estimated H-index: 1
(National Tsing Hua University)
+ 1 AuthorsYun-Wei Lin4
Estimated H-index: 4
(National Chiao Tung University)
IoTtalk is a platform for IoT device interaction, which has been used to develop many IoT applications such as home automation. This paper uses Flower Sermon artwork as an example to show how interactive visual design can be conveniently implemented in IoTtalk. The Flower Sermon artwork conducts cyber physical interaction, which animates a dandelion in a mirror when a person smiles at that mirror. The dandelion grows larger as the person smiles bigger. The flower also vibrates following the hear...
1 Citations Source Cite
Published on Aug 25, 2018in Mobile Networks and Applications 2.50
Fekher Khelifi1
Estimated H-index: 1
(University of Monastir),
Abbas Bradai9
Estimated H-index: 9
(University of Poitiers)
+ 2 AuthorsMohamed Atri10
Estimated H-index: 10
(University of Monastir)
With the rapid development in wireless technologies and the Internet, the Internet of Things (IoT) is envisioned to be an integral part of our daily lives. Localization-based services are among the most attractive applications related to the IoT. They are actually, thanks to the deployment of networks of sensors, able to collect and transmit data in order to determine the targets position. A plethora of localization systems are proposed in the literature. These localization systems are based on ...
2 Citations Source Cite
Published on Feb 15, 2018in Mobile Networks and Applications 2.50
Song Guo30
Estimated H-index: 30
(Chongqing University of Posts and Telecommunications),
Deze Zeng18
Estimated H-index: 18
(China University of Geosciences)
+ 1 AuthorsJiangtao Luo1
Estimated H-index: 1
(Chongqing University of Posts and Telecommunications)
Wireless networks have experienced fast development in the past decades. Various advancing wireless technologies have been proposed. To catch up with the ever-increasing diverse communication needs, cloud-radio access networks (C-RAN), which decouples the baseband processing unit (BBU) from the remote radio head (RRH), has been proposed. On the other hand, it has been widely recognized that huge energy consumption has been raised due to the massive deployment of cellular networks. Lowering the n...
1 Citations Source Cite
Published on May 23, 2018in Mobile Networks and Applications 2.50
Khalim Amjad Meerja5
Estimated H-index: 5
,
Praveen V. Naidu1
Estimated H-index: 1
,
Sri Rama Krishna Kalva1
Estimated H-index: 1
Many devices share their data with the online world to derive global knowledge and information that have high business value. Trillions of smart devices are connected together over the Internet, which are known as Internet-of-Things (IoT). These devices generate enormous data on daily basis, in orders of Exabytes, which is called Big Data. Since cloud services are used to handle the Big Data generated from these IoT devices, new architectures for handling smart devices are designed through cloud...
1 Citations Source Cite
Published on Jul 23, 2018in Mobile Networks and Applications 2.50
Hai-Cheng Chu (National Taichung University of Education), Chun-Hsien Sung (Beijing Institute of Technology), Hui-Lin Lee (National Taiwan Normal University)
Nowadays, the unparalleled growth of Internet of Things (IoT) is a new digital disruption which intelligent devices are connected and working together. IoT connects personal computers, tablets, and smart phones in our daily communications from leisure purposes to business tasks. However, the security concern of IoT can’t be overemphasized due to the connectivity among communication gadgets. Sustainably, Twitter is one of the most popular Instant Message (IM) toolkits today. When Twitter is being...
Source Cite
Published on Nov 22, 2018
Saqib Rasool1
Estimated H-index: 1
,
Muddesar Iqbal11
Estimated H-index: 11
+ 2 AuthorsL Shancang
Mobile Ad-hoc Cloud (MAC) is the constellation of nearby mobile devices to serve the heavy computational needs of the resource constrained edge devices. One of the major challenges of MAC is to convince the mobile devices to offer their limited resources for the shared computational pool. Credit based rewarding system is considered as an effective way of incentivizing the arbitrary mobile devices for joining the MAC network and to earn the credits through computational crowdsourcing. The next ch...
Published on Aug 14, 2018in Mobile Networks and Applications 2.50
Idris Winarno3
Estimated H-index: 3
,
Yoshiteru Ishida16
Estimated H-index: 16
(Toyohashi University of Technology),
Takeshi Okamoto6
Estimated H-index: 6
(Kanagawa Institute of Technology)
One of the essential parts of the cloud infrastructure is a computer server. Therefore, we need to preserve the computer server from failure, such as hang, denial of service and malware. Today, the data center (a collection of computer servers) has been shifting from traditional to an era of virtualization technology. Since we use virtualization for our server, a popular technique to monitor our server condition is Virtual Machine Introspection (VMI). There are two types of VMI: in-VMI and out-V...
1 Citations Source Cite
Published on Oct 2, 2018in Mobile Networks and Applications 2.50
Sebastian Pape3
Estimated H-index: 3
(Goethe University Frankfurt),
Kai Rannenberg16
Estimated H-index: 16
(Goethe University Frankfurt)
The concept of cloud computing relies on central large datacentres with huge amounts of computational power. The rapidly growing Internet of Things with its vast amount of data showed that this architecture produces costly, inefficient and in some cases infeasible communication. Thus, fog computing, a new architecture with distributed computational power closer to the IoT devices was developed. So far, this decentralised fog-oriented architecture has only been used for performance and resource m...
2 Citations Source Cite
12345678910