• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 61
  • 10
  • 8
  • 7
  • 5
  • 4
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 117
  • 117
  • 26
  • 25
  • 20
  • 19
  • 19
  • 18
  • 13
  • 12
  • 12
  • 10
  • 10
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Software Test Strategies for the RNC RNH Subsystem

Yazdi, Mohammad Hamed January 2013 (has links)
This work concerns software testing strategies for the Radio Network Controller (RNC) RadioNetwork Handler (RNH) subsystem at the WCDMA development department at Ericsson AB. Due to the rapid development in the area of radio communication It is crucial to constantly develop and deliver new software components without errors in the code, which has to be tested and proved to work on a regular basis. Since development teams are working in parallel, one cannot uphold another team for long periods for testing purposes. It should be easy and straightforward to implement and maintain RNH tests. The main goal is to propose the best way of software testing for the RNH subsystem with respect to the agile way of working. In the first part of this work an investigation of the RNH software was done. This was to define a template for code classification. The aim of the classification is to identify a smallest testable unit for different testing levels. The data classes were considered as smallest testable unit for testing on low level. In the second part, unit test was deployed to two different blocks to evaluate unit testing and prove testability of data classes on a low level. In addition, the automated regression test framework was evaluated with respect to node level testing performance. In the third part, unit test was evaluated in comparison to the current testing level at RNH. The major result of this investigation shows all testing levels are required for the RNH subsystem, because each level focuses on a specific area of software testing. Furthermore, unit testing is recommended to be a permanent testing level at RNH subsystem, since unit testing is promoted by agile testing strategies (test as early as possible). Besides, when more detailed test on low level (unit testing) is applied, it may lead to the less testing effort on higher level.
12

Big data-driven optimization for performance management in mobile networks

Martinez-Mosquera, Diana 15 November 2021 (has links)
Humanity, since its inception, has been interested in the materialization of knowledge. Various ancient cultures generated a lot of information through their writing systems. The beginning of the increase of information could date back to 1880 when a census performed in the United States of America took 8 years to be tabulated. In the 1930s the demographic growth exacerbated this increase of data. Already in 1940, libraries had collected a large amount of writing and it is in this decade when scientists begin to use the term “information explosion”. The term first appears in the Lawton (Oklahoma) Constitution newspaper in 1941. Currently, it can be said that we live in the age of big data. Exabytes of data are generated every day; therefore, the term big data has become one of the most important concepts in information systems. Big data refer to large amounts of data on a large scale that exceeds the capacity of conventional software to be captured, processed, and stored in a reasonable time. As a general criterion, most experts consider big data to be the largest volume of data, the variety of formats and sources from which it comes, the immense speed at which it is generated, the veracity of its content, and the value of the information extracted/processed. Faced with this reality, several questions arise: How to manipulate this large amount of data? How to obtain important results to gain knowledge from this data? Therefore, the need to create a connecting bridge between big data and wisdom is evident. People, machines, applications, and other elements that make up a complex and constantly evolving ecosystem are involved in this process. Each project presents different peculiarities in the development of an framework based on big data. This, in turn, makes the landscape more complex for the designer since multiple options can be selected for the same purpose. In this work, we focus on an framework for processing mobile network performance management data. In mobile networks, one of the fundamental areas is planning and optimization. This area analyzes the key performance indicators to evaluate the behavior of the network. These indicators are calculated from the raw data sent by the different network elements. The network administration teams, which receive these raw data and process them, use systems that are no longer adequate enough due to the great growth of networks and the emergence of new technologies such as 5G and 6G that also include equipment from the Internet of things. For the aforementioned reasons, we propose in this work a big data framework for processing mobile network performance management data. We have tested our proposal using performance files from real networks. All the processing carried out on the raw data with XML format is detailed and the solution is evaluated in the ingestion and reporting components. This study can help telecommunications vendors to have a reference big data framework to face the current and future challenges in the performance management in mobile networks. For instance, to reduce the processing time data for decisions in many of the activities involved in the daily operation and future network planning.
13

Security for networked smart healthcare systems: A systematic review

Ndarhwa, Nyamwezi Perfect 06 April 2023 (has links) (PDF)
Background and Objectives Smart healthcare systems use technologies such as wearable devices, Internet of Medical Things and mobile internet technologies to dynamically access health information, connect patients to health professionals and health institutions, and to actively manage and respond intelligently to the medical ecosystem's needs. However, smart healthcare systems are affected by many challenges in their implementation and maintenance. Key among these are ensuring the security and privacy of patient health information. To address this challenge, several mitigation measures have been proposed and some have been implemented. Techniques that have been used include data encryption and biometric access. In addition, blockchain is an emerging security technology that is expected to address the security issues due to its distributed and decentralized architecture which is similar to that of smart healthcare systems. This study reviewed articles that identified security requirements and risks, proposed potential solutions, and explained the effectiveness of these solutions in addressing security problems in smart healthcare systems. Methods This review adhered to the Preferred Reporting Items for Systematic Reviews and Meta-analysis (PRISMA) guidelines and was framed using the Problem, Intervention, Comparator, and Outcome (PICO) approach to investigate and analyse the concepts of interest. However, the comparator is not applicable because this review focuses on the security measures available and in this case no comparable solutions were considered since the concept of smart healthcare systems is an emerging one and there are therefore, no existing security solutions that have been used before. The search strategy involved the identification of studies from several databases including the Cumulative Index of Nursing and Allied Health Literature (CINAL), Scopus, PubMed, Web of Science, Medline, Excerpta Medical database (EMBASE), Ebscohost and the Cochrane Library for articles that focused on the security for smart healthcare systems. The selection process involved removing duplicate studies, and excluding studies after reading the titles, abstracts, and full texts. Studies whose records could not be retrieved using a predefined selection criterion for inclusion and exclusion were excluded. The remaining articles were then screened for eligibility. A data extraction form was used to capture details of the screened studies after reading the full text. Of the searched databases, only three yielded results when the search strategy was applied, i.e., Scopus, Web of science and Medline, giving a total of 1742 articles. 436 duplicate studies were removed. Of the remaining articles, 801 were excluded after reading the title, after which 342 after were excluded after reading the abstract, leaving 163, of which 4 studies could not be retrieved. 159 articles were therefore screened for eligibility after reading the full text. Of these, 14 studies were included for detailed review using the formulated research questions and the PICO framework. Each of the 14 included articles presented a description of a smart healthcare system and identified the security requirements, risks and solutions to mitigate the risks. Each article also summarized the effectiveness of the proposed security solution. Results The key security requirements reported were data confidentiality, integrity and availability of data within the system, with authorisation and authentication used to support these key security requirements. The identified security risks include loss of data confidentiality due to eavesdropping in wireless communication mediums, authentication vulnerabilities in user devices and storage servers, data fabrication and message modification attacks during transmission as well as while the data is at rest in databases and other storage devices. The proposed mitigation measures included the use of biometric accessing devices; data encryption for protecting the confidentiality and integrity of data; blockchain technology to address confidentiality, integrity, and availability of data; network slicing techniques to provide isolation of patient health data in 5G mobile systems; and multi-factor authentication when accessing IoT devices, servers, and other components of the smart healthcare systems. The effectiveness of the proposed solutions was demonstrated through their ability to provide a high level of data security in smart healthcare systems. For example, proposed encryption algorithms demonstrated better energy efficiency, and improved operational speed; reduced computational overhead, better scalability, efficiency in data processing, and better ease of deployment. Conclusion This systematic review has shown that the use of blockchain technology, biometrics (fingerprints), data encryption techniques, multifactor authentication and network slicing in the case of 5G smart healthcare systems has the potential to alleviate possible security risks in smart healthcare systems. The benefits of these solutions include a high level of security and privacy for Electronic Health Records (EHRs) systems; improved speed of data transaction without the need for a decentralized third party, enabled by the use of blockchain. However, the proposed solutions do not address data protection in cases where an intruder has already accessed the system. This may be potential avenues for further research and inquiry.
14

Performance analysis of a hybrid topology CDD/TDD-CDMA network architecture

Powell, Michael-Philip 01 March 2007 (has links)
Student Number : 0006936H - MSc research report - School of Electrical and Information Engineering - Faculty of Engineering and the Built Environment / Code division duplexing (CDD) has steadily garnered attention in the telecommunication community. In this project report we propose a physical layer implementation of CDD that utilizes orthogonal Gold codes as the means of differentiating transmission directions, in order to implement an ad-hoc networking infrastructure that is overlaid on a standard mobile networking topology, and hence creating a hybrid networking topology. The performance of the CDD based system is then comparatively assessed in two ways: from the perspective of the physical layer using point-to-point simulations and from the perspective of the network layer using an iterative snapshot based simulation where node elements are able to setup connections based on predefined rules.
15

Amélioration de la transparence et du contrôle par l'utilisateur dans les réseaux mobiles / Improving transparency and end-user control in mobile

Rao, Ashwin 19 December 2013 (has links)
Les terminaux mobiles (smartphones et tablettes) sont devenus les terminaux les plus populaires pour accéder à Internet. Cependant, l'écosystème incluant les terminaux mobiles est maintenu opaque à cause des intérêts financiers des différents acteurs : les concepteurs des systèmes d'exploitation et des applications, les opérateurs des "stores", et les FAI. Cette opacité est renforcée par le peu de contrôle qu'ont les utilisateurs sur les informations échangées par leur terminal. Pour résoudre ce problème d'opacité et de manque de contrôle, on a créé une plate-forme, Meddle, qui utilise la redirection de trafic des terminaux mobiles pour analyser et modifier ce trafic. Contrairement aux solutions qui nécessitent d'être implémentées sur le terminal, Meddle combine les techniques de VPN et de "middlebox" pour offrir une solution indépendante de l'OS, du FAI et de l'accès radio. On a utilisé Meddle pour des expérimentations contrôlées et pour une étude utilisateurs approvée par un IRB. On a observé que des applications populaires sous iOS et Android exposaient des informations personnelles dans le traffic réseau en clair et chiffré. On a ensuite exploité Meddle pour prévenir ces fuites d'informations privées. On a également utilisé Meddle pour étudier les caractéristiques réseaux du trafic vidéo sur Internet. On a trouvé que ce trafic dépend fortement du type de terminal, de l'application utilisée pour regarder la vidéo (application native ou navigateur Web) et du contenant (HTML5, Flash, Silverlight). Ce résultat montre qu'un changement dans le terminal, l'application ou le contenant peut avoir un impact important sur le réseau. / Mobile devices are increasingly becoming the primary device to access the Internet. Despite this thriving popularity, the current mobile ecosystem is largely opaque because of the vested monetary interests of its key players: mobile OS providers, creators of mobile applications, stores for mobile applications and media content, and ISPs. This problem of opaqueness is further aggravated by the limited control end-users have over the information exchanged by their mobile devices. To address this problem of opaqueness and lack of control, we create a user-centric platform, Meddle, that uses traffic indirection to diagnose mobile devices. Compared to an on-device solution, Meddle uses two well-known technologies, VPNs and middleboxes, and combines them to provide an OS, ISP, and access technology agnositic solution. We use Meddle for controlled experiments and an IRB approved study, and ob- served that popular iOS and Android applications leak personally identifiable information in the clear and also over SSL. We then use Meddle to prevent further leaks. We also use our platform to detail the network characteristics of video streaming services, the most popular Web-service in the current Internet. We observe that the network traffic characteristics vary vastly with the device (mobile or desktop), application (native applications and also between individual desktop browsers), and container (HTML5, Flash, and Silverlight). This observation is important because the increased adoption of one application or streaming service could have a significant impact on the network traffic, for example, an increase in the usage of mobile applications.
16

Performing and making use of mobility prediction

François, Jean-Marc 22 May 2007 (has links)
Mobility prediction is defined as guessing the next access point(s) a mobile terminal will join so as to connect to a (wired or wireless) network. Knowing in advance where a terminal is heading for allows taking proactive measures so as to mitigate the impact of handovers and, hence, improve the network QoS. This thesis analyzes this topic from different points of view. It is divided into three parts. The first part evaluates the feasibility of mobility prediction in a real environment. It thus analyzes a mobility trace captured from a real network to measure the intrinsic entropy of the nodes motion and to measure the effectiveness of a simple prediction method. The second part investigates how to perform mobility prediction. Firstly, it examines a generic prediction scheme based on a simple machine learning method; this scheme is evaluated under various conditions. Secondly, it shows how the pieces of information that are most useful for the prediction algorithm can be obtained. The third part studies how knowing the probable next access point of a mobile terminal allows one to improve the QoS of the network considered. We deal with two situations. We first show how the handover blocking rate of a cellular network can be decreased thanks to resource reservation. We then propose a new routing protocol for delay tolerant networks (i.e. an ad hoc network where packets must be delayed in the absence of an end-to-end path) that assumes that the contacts between the nodes can be (imperfectly) predicted.
17

A Fuzzy Logic-Based Approach for Node Localization in Mobile Sensor Networks

Chenji Jayanth, Harshavardhan 2009 December 1900 (has links)
In most range-based localization methods, inferring distance from radio signal strength using mathematical modeling becomes increasingly unreliable and complicated in indoor and extreme environments, due to effects such as multipath propagation and signal interference. We propose FuzLoc, a range-based, anchor-based, fuzzy logic enabled system system for localization. Quantities like RSS and distance are transformed into linguistic variables such as Low, Medium, High etc. by binning. The location of the node is then solved for using a nonlinear system in the fuzzy domain itself, which outputs the location of the node as a pair of fuzzy numbers. An included destination prediction system activates when only one anchor is heard; it localizes the node to an area. It accomplishes this using the theoretical construct of virtual anchors, which are calculated when a single anchor is in the node’s vicinity. The fuzzy logic system is trained during deployment itself so that it learns to associate an RSS with a distance, and a set of distances to a probability vector. We implement the method in a simulator and compare it against other methods like MCL, Centroid and Amorphous. Extensive evaluation is done based on a variety of metrics like anchor density, node density etc.
18

An Anonymous Authentication Protocol with Chargeability and Fair Privacy for Mobile Network Environments

Huang, Shi-Ming 26 July 2006 (has links)
Mobile network equipments are widely popularized and advanced mobile communication services are provided increasingly such that ubiquitous computing environments will come true soon. It is a pleasure for mobile users to work or get recreations in the mobile network environments. However, just as the cases in wireline environments, there are a lot of security threats to mobile network systems and their impact on the security is more serious than that in wireline environments owing to the feature of wireless transmissions and the ubiquity property in mobile network systems. The secret personal information, important data, or classified missives which mobile users carry may be stolen by malicious entities. In order to guarantee the quality of the advanced communication services, the security and privacy would be the important issues when mobile users roam to the mobile networks. In this thesis, an anonymous authentication protocol will be proposed to protect both the security of the mobile network system and the privacy of mobile users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also the identity of each user can be kept secret against anyone else including the system. Although the users are anonymously authenticated by the system, it can still make correct bills to charge these anonymous users. Finally, our protocol also achieves the goal of fair privacy which allows the judge to be able to revoke the anonymity and trace the illegal users when they misused the anonymity property such as they committed crimes.
19

Cooperative Location Update in Wireless Mobile Networks

Ye, Cai-Fang 06 August 2008 (has links)
In this paper, in order to reduce the location update cost in wireless mobile networks, we propose a cooperative location update scheme. The proposed scheme first discovers the statistical relation between mobile stations according to their history of location update and paging. In order to reduce the total cost of mobility management, we propose integrating the cooperative location update scheme with the concurrent search scheme. We use analytical results and simulation results to justify the usage of the proposed approach.
20

Concurrent Search for Digital Content in Wireless Mobile Networks

Wu, Cheng-Lin 06 August 2008 (has links)
With the state-of-the-art IC technology, we can share a variety of digital content stored in our mobile devices via wireless communications. When requests for digital content arrive, base stations have to search for at least one copy of the digital content. We extend the concurrent search approach to efficiently location digital content. In addition, we propose the opportunistic concurrent search scheme in which a base station could use a single channel to page a number of mobile stations simultaneously. We use computer simulations to evaluate the performance and justify the usage of the proposed schemes.

Page generated in 0.0468 seconds