2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies

9-11 Sept. 2015

Filter Results

Displaying Results 1 - 25 of 79
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (2944 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (303 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (231 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • Message from the Chair

    Publication Year: 2015, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (179 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2015, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • Acknowledgements

    Publication Year: 2015, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2015, Page(s):xvi - xviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Streaming at the Edge: Local Service Concepts Utilizing Mobile Edge Computing

    Publication Year: 2015, Page(s):1 - 6
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    Mobile Edge Computing is a novel concept where regular servers is placed within the LTE networks' eNode-Bs. These servers allow to run third party services directly at the edge of the network, providing minimal latency to the user equipment while minimizing the use of packet core bandwidth. Conserving bandwidth has become increasingly important for the mobile network operators as the mobile traffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Device-Controlled Traffic Steering in Mobile Networks

    Publication Year: 2015, Page(s):7 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    User equipments (UEs) such as smartphones and tablets are widely used in heterogeneous wireless networks which include different technologies like WiFi and Long Term Evolution (LTE) systems. Implementing traffic steering effectively for user equipments to maximize their quality of service has become a key challenge these years. Therefore, in this paper, we propose a device controlled mechanism. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refining Mobile Web Design for Reducing Energy Consumption of Mobile Terminals

    Publication Year: 2015, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Recent years have seen an increasing demand of web applications on mobile terminals. However, web pages, conventionally designed for PCs with stable power supply and large screen, do not lead to the same user experience when directly running on mobile terminals with limited battery and small screen. There have been some initial efforts on mobile-enabled web design, but the energy consumption of we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spheres: A Web Services Framework for Smartphone Sensing as a Service

    Publication Year: 2015, Page(s):19 - 28
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2208 KB) | HTML iconHTML

    Smartphones are mobile phones that execute application programs. Smartphones are practically everywhere, in every country and culture. Smartphones can tell where they are by GPS, a spatial sense, and what time it is, a temporal sense, relative to their GPS location. Groups of smartphone users form communities, creating a social sense. Smartphones often contain built-in sensors including temperatur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Service Query Selection for a Professional Social Network Members

    Publication Year: 2015, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    The emergence of social networks have opened a new paradigm for Web practises from an individual (called as an actor or a member) to a professional students groups to exchange their information with their contemporaries quickly and efficiently. The social networking enables to set up relations among the actors who share common interests, activities or connections. The blending of a social network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BBCast: Cloud-Based Interactive Public Bulletin Board

    Publication Year: 2015, Page(s):35 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1624 KB) | HTML iconHTML

    Interactive digital displays are now finding their way in various public spaces as tools for information dissemination. Current methods of deploying such technologies include installation of large screens along with expensive and bulky dedicated machines making them costly for multiple deployments. Interaction with these displays is done through sensors or through mobile applications but often fai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of Management System for Generated Power Using Cloud Services: Application to Aero-Bike Equipped with Dynamo

    Publication Year: 2015, Page(s):41 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2269 KB) | HTML iconHTML

    This paper presents a power management system, using cloud services, for the power generated by an aero-bike fitted with a dynamo. The system requirements necessary for stable operation and use are summarized. The system incorporates elements to charge rechargeable batteries efficiently and also to maintain the user's motivation by providing some enjoyment and pleasure while using the system. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Denial of Service Attacks Mitigation in the Cloud

    Publication Year: 2015, Page(s):47 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    Denial of Service attack (DoS) forms a permanent risk to the traditional networks and the cloud environment. This malicious attack can be amplified by Distributed Denial of Service (DDoS) attacks. Moreover, the cloud payment model can be affected by such attacks exploiting the cloud scalability. In this case, it is called Economical Denial of Sustainability (EDoS) attack. This study introduces an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancement in Homomorphic Encryption Scheme for Cloud Data Security

    Publication Year: 2015, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there are some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user's behalf. There are different encrypti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud

    Publication Year: 2015, Page(s):60 - 65
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    Distributed Denial of Service (DDoS) attacks can affect the availability of the networks. In the age of cloud computing, these attacks are being more harmful in terms of their common influences and their new effects that harm the cloud sustainability by exploiting its scalability and payment model (pay-as-you-use). Therefore, a new form of DDoS attacks is introduced in the cloud context as an econ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connect and Control Things: Integrating Lightweight IoT Framework into a Mobile Application

    Publication Year: 2015, Page(s):66 - 71
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    Mobile applications running on smart devices are important enablers for Internet of Things (IoT). This paper presents a novel mobile application called "Connect and Control Things" (CCT) which integrates a lightweight IoT framework into smartphones and tablets. The framework is designed to discover & interact with things, reason with M2M data, provide configuration management facilities al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet of Things: A Definition & Taxonomy

    Publication Year: 2015, Page(s):72 - 77
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (754 KB) | HTML iconHTML

    The Internet of Things (IoT) has various fields of application including health care, resource management, asset tracking, etc. Depending on the use case, various technologies like RFID, Wireless Sensor Network (WSN) or Smart Objects can be used. With each of these comes a specific vision of what the IoT and connected objects are and -- to our knowledge -- there is no global picture of the IoT. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Q-learning Based Random Access with Collision free RACH Interactions for Cellular M2M

    Publication Year: 2015, Page(s):78 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB) | HTML iconHTML

    This paper investigates the coexistence of M2M and H2H based traffic sharing the RACH of an existing cellular network. Q-learning is applied to control the RACH access of the M2M devices which enables collision free access amongst the M2M user group. Frame ALOHA for a Q-learning RACH access (FA-QL-RACH) is proposed to realise a collision free RACH access between the H2H and M2M user groups. The sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Urban Scale Context Dissemination in the Internet of Things: Challenge Accepted

    Publication Year: 2015, Page(s):84 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    Mobile applications envisaged in the Smart City rely on the capacity of acquiring context from a vast array of sensors and other data sources, to deliver context-aware services at an urban scale whilst leveraging the Internet of Things (IoT). This work analyses existing context dissemination techniques, encompassing both probabilistic and deterministic algorithms, and advocates the case for ACT (A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things

    Publication Year: 2015, Page(s):90 - 95
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    The strong development of the Internet of Things (IoT) is changing traditional perceptions of the current Internet towards a vision of smart objects interacting with each other. In this vision e-health applications are one of the most promising applications in IoT. However, security issues are the major obstacle for their deployment. Among these issues, authentication of the different interconnect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.